SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
A part of UTC Climate, Controls & Security
The Invisible Component of
Cold Chain Management
R isk Mit ig ation
Overview
The practice of cold chain management continues to evolve rapidly. New developments in hardware,
software and global connectivity provide an unprecedented window into cold chain performance. This
has led to dramatic improvements in handling, storage and distribution, and the promise of greater
cooperation among supply chain partners.
This has also convinced cold chain managers that their monitoring program must be greater than the
sum of its parts. Robust, responsive and accurate dataloggers are essential, as is powerful software
and reliable, secure web hosting. However, smart cold chain management looks beyond the visible
components of monitoring programs to address their underlying structure and stability. One of these
critical but less visible components is risk mitigation.
Defining Risk Mitigation
Risk mitigation of cold chain management is defined by three key, auditable elements:
•	 IT security and redundancy
•	 Supply chain risk management
•	 Disaster recovery planning
If these three components are properly structured, the long-term viability and efficacy of a cold chain
program is substantially strengthened, as is the confidence of the cold chain management team.
In addition, knowledgeable managers also look to the stability, industry knowledge and thought leadership
of their solution provider as another way to assess the strength and competitiveness of their program.
Risk Mitigation The Invisible Component of Cold Chain Management
A Company Commitment
Quality Management System (QMS)
Sensitech’s QMS represents a companywide commitment to Quality that enhances every activity the company
undertakes. As a supplier of “critical components,” the company tests its hardware and software products against
rigorous standards, including the National Institute of Standards and Technology (NIST), ISO 9001:2008, and
applicable elements of common Good Manufacturing Practices (cGMP). Sensitech adheres to validation protocols
and enforces quality control at every level. The underlying QMS is grounded in a well-documented and audited
program of continuous process improvement and incorporates standards in Relentless Root Cause Analysis (RRCA)
and Corrective Action / Preventative Action (CAPA). Finally, Sensitech’s manufacturing principals are grounded in six
sigma and lean manufacturing programs.
Element 1
IT Security and Redundancy
Sensitech is a subsidiary of Carrier Corporation, which is part of UTC Climate, Controls and Security, a $19 billion
unit of United Technologies Corporation. The internal IT resources available to Sensitech, and the standards for
redundancy and security it must meet under UTC quality guidelines, embody world-class practices.
Designed with redundant architecture, Sensitech’s ColdStream® solution is used by customers to collect data, monitor
shipments and provide notification and alarms. The ColdStream smart client installed on customers’ desktops works
in online or offline modes, reducing impact on the real-time acceptance of product and ensuring data integrity in
the event of intermittent internet connectivity at a remote receiving site. Network infrastructure and servers are fully
redundant to insure minimal impact to customers in the event of a server or network issue.
Customer-specific ColdStream databases are hosted in a hardened data center, located in an offsite, independent
facility that provides power sources, redundant points of connectivity to the Internet, and security mechanisms against
fire, physical threats and natural disasters. All ColdStream databases are monitored and supported 24x7 with a fully
replicated mirrored site in a separate geographic region of the United States. Data is synchronized between the two
sites, regularly audited and compliant with Statement on Standards for Attestation Engagements (SSAE) 16.
The ColdStream application and data hosting components are built to satisfy the requirements of FDA 21 CFR
Part 11, including audit trail and traceability for all electronic records, multi-layered permissioning, and backward
compatibility for previously acquired data files.
Customer data is backed-up according to information technology best practices. Before the data is stored in an offsite
data vault, the back-up process includes encryption and compression; these formats remain throughout the length of
storage. Backed-up data is tested and verified to be recoverable annually.
Sensitech’s ColdStream environment and Quality Management System (QMS) have successfully passed all customer
audits, now numbering more than 100 over the past decade, to the satisfaction of our cGMP customer base.
Sensitech securely hosts cold chain and logistics data for over 200 companies around the globe.
Key Questions
1	Is data integrity ensured?
2	Is data warehousing adequate, and compliant with 21 CFR Part 11?
3	Can these cold chain protocols be audited?
Risk Mitigation The Invisible Component of Cold Chain Management
Element 2
Supply Chain Risk Management
Many of Sensitech’s customers consider temperature dataloggers and their related systems to be “critical
components” of a Quality Management System. Therefore a disruption in the supply of monitors can lead directly
to disruption of the shipment of a customer’s product.
Sensitech has three primary means of mitigating this risk:
•	 Adequate safety stock
•	 Dual-sourcing strategy for critical components
•	 Multiple manufacturing sites
Sensitech employs best-in-class standards to meet its goal of adequate safety stock, factoring in the variability of
demand at the component, work-in-process, and finished goods levels. The use of a pull-based replenishment
system supports global flexibility and drives a high-velocity supply chain. Sensitech maintains at least three month’s
finished goods inventory in various global locations, at manufacturing sites and in-transit. Safety stocks are verified
through scheduled reporting and site visits.
The company’s dual-sourcing strategy incorporates alternate component qualifications, as well as testing and
validation of goods produced with these alternate components. Sensitech’s quality procedures insure continuous
testing from the component specification to the finished goods level with quarterly reported statistics. Additionally,
unit-level calibration is linked to the unique serial number at the device-level and documented in certificates of
validation provided with each order.
Finally, Sensitech’s product can be manufactured in Asia, Eastern Europe and the United States. Each manufacturing
facility has the assets and infrastructure to meet all Sensitech volume requirements. Sensitech’s primary manufacturers
also have remotely-located sister companies that support the manufacturer’s disaster recovery program and provide
added assurance to Sensitech.
Questions to Ask
1	Does my cold chain provider keep adequate safety stock?
2	Does my provider have a credible plan for the dual-sourcing of critical components?
3	Does my provider have the reach and supply chain muscle to carry out its plans?
4	Do I feel comfortable that the risk of product disruption is minimized?
Element 3
Disaster Recovery Planning
Under UTC’s guidance, Sensitech adheres to a Business Continuity and Disaster Recovery protocol designed to
either maintain or resume mission-critical functions in the event of a disaster. The Sensitech plan specifies annual
readiness evaluations, and the ability to deploy multiple monitor programming sites and fulfillment operations around
the globe. Sensitech’s practices mandate the monitoring of adequate safety stock, coverage by appropriate levels of
general liability insurance to protect Sensitech assets and infrastructure, and immediate notification to customers in
the event disaster recovery is invoked.
At all times Sensitech has access to the corporate resources of Carrier, UTC Climate, Controls and Security and UTC.
Questions to Ask
1	Does my cold chain provider have a Business Continuity / Disaster Recovery Plan?
2	Is it adequate to meet the needs of my cold chain in the event of a disaster?
3	 Are notification practices adequate?
4	 Are my cold chain provider’s insurance levels adequate to protect its assets and infrastructure?
A part of UTC Climate, Controls  Security
© 2013 Sensitech Inc. All rights reserved.
Amsterdam Boston Hong Kong Melbourne Mumbai Santiago
Sensitech Inc. • 800 Cummings Center • Suite 258X • Beverly, MA 01915-6197 • 1-800-843-8367 • +1-978-927-7033 • Fax: +1-978-921-2112 • www.sensitech.com
01/13
Stability and Thought-Leadership
Founded in 1990, Sensitech is a global leader in cold chain monitoring. First certified under ISO in 1999, Sensitech
has an unbroken history of recertification in its primary facilities, and currently is certified to ISO 9001:2008 standards.
All of Sensitech’s outsourced manufacturing sites are certified to ISO 9001:2008 and ISO 13485 standards for
medical device manufacturing.
The first company to offer a global, single-use, electronic monitoring programs, Sensitech has provided almost a
quarter century of innovation and thought-leadership in driving Good Cold Chain Management Practices (GCCMP)
for the Pharmaceutical, Food, and Industrial Chemical industries.
This includes active membership in the Parenteral Drug Association (PDA), participation in a number of subgroups,
and contributions to Technical Reports. Sensitech has also participated as a member of the technical steering
committee of the PDA’s Pharmaceutical Cold Chain Interest Group (PCCIG), the International Safe Transit
Association (ISTA) Thermal Council, the Association Francaise du Froid (AFF) French Cold Chain Council, and is on
the International Air Transport Association’s (IATA) Time and Temperature Task Force (TTTF) a subgroup of its Live
Animal and Perishable Board (LAPB). Additionally, Sensitech has contributed documentation of best practices to U.S.
Pharmacopeia’s (USP) Packaging and Storage Expert Committee for the re-write of USP General Chapter 1079
Good Storage and Distribution Practices for Drug Products.
Sensitech efforts over the past decade have helped to clarify standards for lithium battery compliance, and for
electromagnetic interference (EMI) compliance and documentation. In support of this effort, Sensitech was awarded
the Cool Chain Europe 2010 Best Quality, Qualification or Risk Management Project by Pharma IQ.
Beyond regulations, Sensitech continues to provide the cold chain industry with best-in-class electronic dataloggers,
software, and global cold chain programs that presently serve 3,000 customers around the world.
Sensitech
Putting it All Together
Sensitech is proud of its commitment to a disciplined Quality Management System, rigorous Security and
Redundancy practices, comprehensive Supply Chain Risk Management, powerful Disaster Recovery Planning and
thought-leadership throughout the global cold chain monitoring industry. Taken together, these practices provide
customers with a level of Risk Mitigation that is unique in the industry, and an essential component of every Sensitech
customer offering.

Contenu connexe

Tendances

Soc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-convertedSoc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-convertedVISTA InfoSec
 
Computerized System Validation : Understanding basics
Computerized System Validation : Understanding basics Computerized System Validation : Understanding basics
Computerized System Validation : Understanding basics Anand Pandya
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated ComplianceControlCase
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated ComplianceControlCase
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesControlCase
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance MonitoringControlCase
 
CSV - Computer System Validation
CSV - Computer System Validation CSV - Computer System Validation
CSV - Computer System Validation JayaKrishna161
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1ControlCase
 
Integrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to ManyIntegrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to ManyControlCase
 
Codex validation Group presentation
Codex validation Group presentationCodex validation Group presentation
Codex validation Group presentationWalter Acevedo
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructurepramod_kmr73
 
Computerized system validation_final
Computerized system validation_finalComputerized system validation_final
Computerized system validation_finalDuy Tan Geek
 
Myths of validation
Myths of validationMyths of validation
Myths of validationJeff Thomas
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudControlCase
 
NQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity ChecklistNQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity ChecklistNQA
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureUppala Anand
 
Process and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsProcess and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsArta Doci
 

Tendances (20)

Soc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-convertedSoc 2 vs iso 27001 certification withh links converted-converted
Soc 2 vs iso 27001 certification withh links converted-converted
 
Computerized System Validation : Understanding basics
Computerized System Validation : Understanding basics Computerized System Validation : Understanding basics
Computerized System Validation : Understanding basics
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
Gamp 5 overview by jaya prakash ra
Gamp 5 overview by jaya prakash raGamp 5 overview by jaya prakash ra
Gamp 5 overview by jaya prakash ra
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust Principles
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
CSV - Computer System Validation
CSV - Computer System Validation CSV - Computer System Validation
CSV - Computer System Validation
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
 
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013  ChecklistISO/IEC 27001:2005 naar ISO 27001:2013  Checklist
ISO/IEC 27001:2005 naar ISO 27001:2013 Checklist
 
Integrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to ManyIntegrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to Many
 
Codex validation Group presentation
Codex validation Group presentationCodex validation Group presentation
Codex validation Group presentation
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
 
Computerized system validation_final
Computerized system validation_finalComputerized system validation_final
Computerized system validation_final
 
Myths of validation
Myths of validationMyths of validation
Myths of validation
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
 
NQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity ChecklistNQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity Checklist
 
ISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedureISO 27001:2013 Implementation procedure
ISO 27001:2013 Implementation procedure
 
Iso 9000 iso 9001
Iso 9000 iso 9001Iso 9000 iso 9001
Iso 9000 iso 9001
 
Process and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsProcess and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation Elements
 

Similaire à Riskmitigationwhitepaperweb 1

Integrated Technology Solutions for Drug Safety
Integrated Technology Solutions for Drug SafetyIntegrated Technology Solutions for Drug Safety
Integrated Technology Solutions for Drug SafetyCovance
 
Servizi di mappatura per magazzini
Servizi di mappatura per magazziniServizi di mappatura per magazzini
Servizi di mappatura per magazziniClaudia Marchi
 
Computer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft GuidanceComputer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft GuidanceGreenlight Guru
 
Compliance 101 HITRUST Update.pdf
Compliance 101 HITRUST Update.pdfCompliance 101 HITRUST Update.pdf
Compliance 101 HITRUST Update.pdfAmyPoblete3
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 
Security
SecuritySecurity
Securitya1aass
 
Covance Accelerator Methodology Delivers Validated Oracle Argus Cloud in Reco...
Covance Accelerator Methodology Delivers Validated Oracle Argus Cloud in Reco...Covance Accelerator Methodology Delivers Validated Oracle Argus Cloud in Reco...
Covance Accelerator Methodology Delivers Validated Oracle Argus Cloud in Reco...Covance
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixHCLSoftware
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services IntroCruatech
 
Six Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC ComplianceSix Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC ComplianceLumension
 
Adaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_studyAdaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_studyRob Johnston, MBA
 
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...D. Scott Clark
 
Ensuring continuous compliance of security and regulatory policies
Ensuring continuous compliance of security and regulatory policiesEnsuring continuous compliance of security and regulatory policies
Ensuring continuous compliance of security and regulatory policiesHCLSoftware
 

Similaire à Riskmitigationwhitepaperweb 1 (20)

Integrated Technology Solutions for Drug Safety
Integrated Technology Solutions for Drug SafetyIntegrated Technology Solutions for Drug Safety
Integrated Technology Solutions for Drug Safety
 
Servizi di mappatura per magazzini
Servizi di mappatura per magazziniServizi di mappatura per magazzini
Servizi di mappatura per magazzini
 
iWIT-A4-Brochure
iWIT-A4-BrochureiWIT-A4-Brochure
iWIT-A4-Brochure
 
Computer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft GuidanceComputer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
 
Compliance 101 HITRUST Update.pdf
Compliance 101 HITRUST Update.pdfCompliance 101 HITRUST Update.pdf
Compliance 101 HITRUST Update.pdf
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
Security
SecuritySecurity
Security
 
Covance Accelerator Methodology Delivers Validated Oracle Argus Cloud in Reco...
Covance Accelerator Methodology Delivers Validated Oracle Argus Cloud in Reco...Covance Accelerator Methodology Delivers Validated Oracle Argus Cloud in Reco...
Covance Accelerator Methodology Delivers Validated Oracle Argus Cloud in Reco...
 
AGSL brochure
AGSL brochureAGSL brochure
AGSL brochure
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
RSPL Brochure
RSPL BrochureRSPL Brochure
RSPL Brochure
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
Six Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC ComplianceSix Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC Compliance
 
SyCAS Brochure
SyCAS BrochureSyCAS Brochure
SyCAS Brochure
 
Environmental Monitoring in Regulated Labs and Cleanrooms
Environmental Monitoring in Regulated Labs and CleanroomsEnvironmental Monitoring in Regulated Labs and Cleanrooms
Environmental Monitoring in Regulated Labs and Cleanrooms
 
Shree venkateshwara controls
Shree venkateshwara controlsShree venkateshwara controls
Shree venkateshwara controls
 
Adaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_studyAdaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_study
 
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...GLOBAL LIFE SCIENCES COMPANY USES  ADAPTIVEGRC SUITE  TO MANAGE RISK & COMPLI...
GLOBAL LIFE SCIENCES COMPANY USES ADAPTIVEGRC SUITE TO MANAGE RISK & COMPLI...
 
Ensuring continuous compliance of security and regulatory policies
Ensuring continuous compliance of security and regulatory policiesEnsuring continuous compliance of security and regulatory policies
Ensuring continuous compliance of security and regulatory policies
 

Plus de Yasmin AbdelAziz

Strategic Performance Index- OnStrategy
Strategic Performance Index- OnStrategyStrategic Performance Index- OnStrategy
Strategic Performance Index- OnStrategyYasmin AbdelAziz
 
Pharma IQ Serialization Deadlines Updated
Pharma IQ Serialization Deadlines UpdatedPharma IQ Serialization Deadlines Updated
Pharma IQ Serialization Deadlines UpdatedYasmin AbdelAziz
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?Yasmin AbdelAziz
 
Developing Emotional Intelligence for Healthcare Leaders
Developing Emotional Intelligence for Healthcare LeadersDeveloping Emotional Intelligence for Healthcare Leaders
Developing Emotional Intelligence for Healthcare LeadersYasmin AbdelAziz
 
A Theoretical Framework (Modelling) for International Business Management
A Theoretical Framework (Modelling) for International Business ManagementA Theoretical Framework (Modelling) for International Business Management
A Theoretical Framework (Modelling) for International Business ManagementYasmin AbdelAziz
 
WHO Report, the third meeting of the Member State mechanism on substandard/sp...
WHO Report, the third meeting of the Member State mechanism on substandard/sp...WHO Report, the third meeting of the Member State mechanism on substandard/sp...
WHO Report, the third meeting of the Member State mechanism on substandard/sp...Yasmin AbdelAziz
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacyYasmin AbdelAziz
 
Patheon meaningful metrics_whitepaper
Patheon meaningful metrics_whitepaperPatheon meaningful metrics_whitepaper
Patheon meaningful metrics_whitepaperYasmin AbdelAziz
 
Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...
Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...
Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...Yasmin AbdelAziz
 
Managing OEE o optimize factory performance
Managing OEE o optimize factory performanceManaging OEE o optimize factory performance
Managing OEE o optimize factory performanceYasmin AbdelAziz
 
How to Increase the Value of the PMMMs as a Business-oriented Framework
How to Increase the Value of the PMMMs as a Business-oriented FrameworkHow to Increase the Value of the PMMMs as a Business-oriented Framework
How to Increase the Value of the PMMMs as a Business-oriented FrameworkYasmin AbdelAziz
 
Cmrgo wp prd_fordvlpmnt_4pnl_sml
Cmrgo wp prd_fordvlpmnt_4pnl_smlCmrgo wp prd_fordvlpmnt_4pnl_sml
Cmrgo wp prd_fordvlpmnt_4pnl_smlYasmin AbdelAziz
 
Women's rights in the middle east and noth africa, gulf edition
Women's rights in the middle east and noth africa, gulf editionWomen's rights in the middle east and noth africa, gulf edition
Women's rights in the middle east and noth africa, gulf editionYasmin AbdelAziz
 
Sf guide moving_mountains_us_02
Sf guide moving_mountains_us_02Sf guide moving_mountains_us_02
Sf guide moving_mountains_us_02Yasmin AbdelAziz
 
3960 alkermes case_study8_fa7
3960 alkermes case_study8_fa73960 alkermes case_study8_fa7
3960 alkermes case_study8_fa7Yasmin AbdelAziz
 
Africa Supply Chain April 2012
Africa Supply Chain April 2012Africa Supply Chain April 2012
Africa Supply Chain April 2012Yasmin AbdelAziz
 

Plus de Yasmin AbdelAziz (20)

Research Gate: Sun Tzu
Research Gate: Sun TzuResearch Gate: Sun Tzu
Research Gate: Sun Tzu
 
Strategic Performance Index- OnStrategy
Strategic Performance Index- OnStrategyStrategic Performance Index- OnStrategy
Strategic Performance Index- OnStrategy
 
Pharma IQ Serialization Deadlines Updated
Pharma IQ Serialization Deadlines UpdatedPharma IQ Serialization Deadlines Updated
Pharma IQ Serialization Deadlines Updated
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?
 
Developing Emotional Intelligence for Healthcare Leaders
Developing Emotional Intelligence for Healthcare LeadersDeveloping Emotional Intelligence for Healthcare Leaders
Developing Emotional Intelligence for Healthcare Leaders
 
A Theoretical Framework (Modelling) for International Business Management
A Theoretical Framework (Modelling) for International Business ManagementA Theoretical Framework (Modelling) for International Business Management
A Theoretical Framework (Modelling) for International Business Management
 
WHO Report, the third meeting of the Member State mechanism on substandard/sp...
WHO Report, the third meeting of the Member State mechanism on substandard/sp...WHO Report, the third meeting of the Member State mechanism on substandard/sp...
WHO Report, the third meeting of the Member State mechanism on substandard/sp...
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
Patheon meaningful metrics_whitepaper
Patheon meaningful metrics_whitepaperPatheon meaningful metrics_whitepaper
Patheon meaningful metrics_whitepaper
 
Who oct 2014
Who oct 2014Who oct 2014
Who oct 2014
 
Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...
Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...
Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...
 
2014 october newsletter
2014 october newsletter2014 october newsletter
2014 october newsletter
 
Managing OEE o optimize factory performance
Managing OEE o optimize factory performanceManaging OEE o optimize factory performance
Managing OEE o optimize factory performance
 
How to Increase the Value of the PMMMs as a Business-oriented Framework
How to Increase the Value of the PMMMs as a Business-oriented FrameworkHow to Increase the Value of the PMMMs as a Business-oriented Framework
How to Increase the Value of the PMMMs as a Business-oriented Framework
 
Di 27 1
Di 27 1Di 27 1
Di 27 1
 
Cmrgo wp prd_fordvlpmnt_4pnl_sml
Cmrgo wp prd_fordvlpmnt_4pnl_smlCmrgo wp prd_fordvlpmnt_4pnl_sml
Cmrgo wp prd_fordvlpmnt_4pnl_sml
 
Women's rights in the middle east and noth africa, gulf edition
Women's rights in the middle east and noth africa, gulf editionWomen's rights in the middle east and noth africa, gulf edition
Women's rights in the middle east and noth africa, gulf edition
 
Sf guide moving_mountains_us_02
Sf guide moving_mountains_us_02Sf guide moving_mountains_us_02
Sf guide moving_mountains_us_02
 
3960 alkermes case_study8_fa7
3960 alkermes case_study8_fa73960 alkermes case_study8_fa7
3960 alkermes case_study8_fa7
 
Africa Supply Chain April 2012
Africa Supply Chain April 2012Africa Supply Chain April 2012
Africa Supply Chain April 2012
 

Dernier

Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 

Dernier (20)

Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 

Riskmitigationwhitepaperweb 1

  • 1. A part of UTC Climate, Controls & Security The Invisible Component of Cold Chain Management R isk Mit ig ation Overview The practice of cold chain management continues to evolve rapidly. New developments in hardware, software and global connectivity provide an unprecedented window into cold chain performance. This has led to dramatic improvements in handling, storage and distribution, and the promise of greater cooperation among supply chain partners. This has also convinced cold chain managers that their monitoring program must be greater than the sum of its parts. Robust, responsive and accurate dataloggers are essential, as is powerful software and reliable, secure web hosting. However, smart cold chain management looks beyond the visible components of monitoring programs to address their underlying structure and stability. One of these critical but less visible components is risk mitigation. Defining Risk Mitigation Risk mitigation of cold chain management is defined by three key, auditable elements: • IT security and redundancy • Supply chain risk management • Disaster recovery planning If these three components are properly structured, the long-term viability and efficacy of a cold chain program is substantially strengthened, as is the confidence of the cold chain management team. In addition, knowledgeable managers also look to the stability, industry knowledge and thought leadership of their solution provider as another way to assess the strength and competitiveness of their program.
  • 2. Risk Mitigation The Invisible Component of Cold Chain Management A Company Commitment Quality Management System (QMS) Sensitech’s QMS represents a companywide commitment to Quality that enhances every activity the company undertakes. As a supplier of “critical components,” the company tests its hardware and software products against rigorous standards, including the National Institute of Standards and Technology (NIST), ISO 9001:2008, and applicable elements of common Good Manufacturing Practices (cGMP). Sensitech adheres to validation protocols and enforces quality control at every level. The underlying QMS is grounded in a well-documented and audited program of continuous process improvement and incorporates standards in Relentless Root Cause Analysis (RRCA) and Corrective Action / Preventative Action (CAPA). Finally, Sensitech’s manufacturing principals are grounded in six sigma and lean manufacturing programs. Element 1 IT Security and Redundancy Sensitech is a subsidiary of Carrier Corporation, which is part of UTC Climate, Controls and Security, a $19 billion unit of United Technologies Corporation. The internal IT resources available to Sensitech, and the standards for redundancy and security it must meet under UTC quality guidelines, embody world-class practices. Designed with redundant architecture, Sensitech’s ColdStream® solution is used by customers to collect data, monitor shipments and provide notification and alarms. The ColdStream smart client installed on customers’ desktops works in online or offline modes, reducing impact on the real-time acceptance of product and ensuring data integrity in the event of intermittent internet connectivity at a remote receiving site. Network infrastructure and servers are fully redundant to insure minimal impact to customers in the event of a server or network issue. Customer-specific ColdStream databases are hosted in a hardened data center, located in an offsite, independent facility that provides power sources, redundant points of connectivity to the Internet, and security mechanisms against fire, physical threats and natural disasters. All ColdStream databases are monitored and supported 24x7 with a fully replicated mirrored site in a separate geographic region of the United States. Data is synchronized between the two sites, regularly audited and compliant with Statement on Standards for Attestation Engagements (SSAE) 16. The ColdStream application and data hosting components are built to satisfy the requirements of FDA 21 CFR Part 11, including audit trail and traceability for all electronic records, multi-layered permissioning, and backward compatibility for previously acquired data files. Customer data is backed-up according to information technology best practices. Before the data is stored in an offsite data vault, the back-up process includes encryption and compression; these formats remain throughout the length of storage. Backed-up data is tested and verified to be recoverable annually. Sensitech’s ColdStream environment and Quality Management System (QMS) have successfully passed all customer audits, now numbering more than 100 over the past decade, to the satisfaction of our cGMP customer base. Sensitech securely hosts cold chain and logistics data for over 200 companies around the globe. Key Questions 1 Is data integrity ensured? 2 Is data warehousing adequate, and compliant with 21 CFR Part 11? 3 Can these cold chain protocols be audited?
  • 3. Risk Mitigation The Invisible Component of Cold Chain Management Element 2 Supply Chain Risk Management Many of Sensitech’s customers consider temperature dataloggers and their related systems to be “critical components” of a Quality Management System. Therefore a disruption in the supply of monitors can lead directly to disruption of the shipment of a customer’s product. Sensitech has three primary means of mitigating this risk: • Adequate safety stock • Dual-sourcing strategy for critical components • Multiple manufacturing sites Sensitech employs best-in-class standards to meet its goal of adequate safety stock, factoring in the variability of demand at the component, work-in-process, and finished goods levels. The use of a pull-based replenishment system supports global flexibility and drives a high-velocity supply chain. Sensitech maintains at least three month’s finished goods inventory in various global locations, at manufacturing sites and in-transit. Safety stocks are verified through scheduled reporting and site visits. The company’s dual-sourcing strategy incorporates alternate component qualifications, as well as testing and validation of goods produced with these alternate components. Sensitech’s quality procedures insure continuous testing from the component specification to the finished goods level with quarterly reported statistics. Additionally, unit-level calibration is linked to the unique serial number at the device-level and documented in certificates of validation provided with each order. Finally, Sensitech’s product can be manufactured in Asia, Eastern Europe and the United States. Each manufacturing facility has the assets and infrastructure to meet all Sensitech volume requirements. Sensitech’s primary manufacturers also have remotely-located sister companies that support the manufacturer’s disaster recovery program and provide added assurance to Sensitech. Questions to Ask 1 Does my cold chain provider keep adequate safety stock? 2 Does my provider have a credible plan for the dual-sourcing of critical components? 3 Does my provider have the reach and supply chain muscle to carry out its plans? 4 Do I feel comfortable that the risk of product disruption is minimized? Element 3 Disaster Recovery Planning Under UTC’s guidance, Sensitech adheres to a Business Continuity and Disaster Recovery protocol designed to either maintain or resume mission-critical functions in the event of a disaster. The Sensitech plan specifies annual readiness evaluations, and the ability to deploy multiple monitor programming sites and fulfillment operations around the globe. Sensitech’s practices mandate the monitoring of adequate safety stock, coverage by appropriate levels of general liability insurance to protect Sensitech assets and infrastructure, and immediate notification to customers in the event disaster recovery is invoked. At all times Sensitech has access to the corporate resources of Carrier, UTC Climate, Controls and Security and UTC. Questions to Ask 1 Does my cold chain provider have a Business Continuity / Disaster Recovery Plan? 2 Is it adequate to meet the needs of my cold chain in the event of a disaster? 3 Are notification practices adequate? 4 Are my cold chain provider’s insurance levels adequate to protect its assets and infrastructure?
  • 4. A part of UTC Climate, Controls Security © 2013 Sensitech Inc. All rights reserved. Amsterdam Boston Hong Kong Melbourne Mumbai Santiago Sensitech Inc. • 800 Cummings Center • Suite 258X • Beverly, MA 01915-6197 • 1-800-843-8367 • +1-978-927-7033 • Fax: +1-978-921-2112 • www.sensitech.com 01/13 Stability and Thought-Leadership Founded in 1990, Sensitech is a global leader in cold chain monitoring. First certified under ISO in 1999, Sensitech has an unbroken history of recertification in its primary facilities, and currently is certified to ISO 9001:2008 standards. All of Sensitech’s outsourced manufacturing sites are certified to ISO 9001:2008 and ISO 13485 standards for medical device manufacturing. The first company to offer a global, single-use, electronic monitoring programs, Sensitech has provided almost a quarter century of innovation and thought-leadership in driving Good Cold Chain Management Practices (GCCMP) for the Pharmaceutical, Food, and Industrial Chemical industries. This includes active membership in the Parenteral Drug Association (PDA), participation in a number of subgroups, and contributions to Technical Reports. Sensitech has also participated as a member of the technical steering committee of the PDA’s Pharmaceutical Cold Chain Interest Group (PCCIG), the International Safe Transit Association (ISTA) Thermal Council, the Association Francaise du Froid (AFF) French Cold Chain Council, and is on the International Air Transport Association’s (IATA) Time and Temperature Task Force (TTTF) a subgroup of its Live Animal and Perishable Board (LAPB). Additionally, Sensitech has contributed documentation of best practices to U.S. Pharmacopeia’s (USP) Packaging and Storage Expert Committee for the re-write of USP General Chapter 1079 Good Storage and Distribution Practices for Drug Products. Sensitech efforts over the past decade have helped to clarify standards for lithium battery compliance, and for electromagnetic interference (EMI) compliance and documentation. In support of this effort, Sensitech was awarded the Cool Chain Europe 2010 Best Quality, Qualification or Risk Management Project by Pharma IQ. Beyond regulations, Sensitech continues to provide the cold chain industry with best-in-class electronic dataloggers, software, and global cold chain programs that presently serve 3,000 customers around the world. Sensitech Putting it All Together Sensitech is proud of its commitment to a disciplined Quality Management System, rigorous Security and Redundancy practices, comprehensive Supply Chain Risk Management, powerful Disaster Recovery Planning and thought-leadership throughout the global cold chain monitoring industry. Taken together, these practices provide customers with a level of Risk Mitigation that is unique in the industry, and an essential component of every Sensitech customer offering.