Abstract

The storage of data that is collected during a clinical trial must be carefully planned. This chapter discusses issues that should be considered whether a study's data is stored electronically or on paper. Guidelines for securely storing data are provided, with an emphasis on preventing unauthorized access that could detract from the integrity of a study. Issues concerning passwords, access controls, electronic signatures (including 21 CFR 11), and audit trails are considered. Recommendations for the locking and archival of data at the conclusion of a study are detailed.

Introduction

The secure, efficient and accessible storage of clinical trial data is central to the success of clinical research. Whether collected using validated electronic tools or traditional paper forms, data are often transferred many times during the course of a clinical trial. These transfers occur between an organization’s functional groups as well as between companies, contract research organizations (CROs), and regulatory agencies. Hence, the potential for data corruption and version control errors during data storage and transfer is significant and must be minimized to ensure consistency of results and data quality.

Scope

This chapter provides key considerations for the data storage and archival of clinical trial data.

Minimum Standards

Best Practices

Physical Storage

The physical security of original data sources (e.g., case report forms, electronic data files, and other original data documents) should be maintained carefully. Original paper and electronic documents should be warehoused in secure rooms or file cabinets with controlled access. Whenever possible, paper documents should be scanned soon after receipt and archived electronically so that they are included with the backup of other electronic files.

Database servers can be the primary warehouse of clinical data and should be physically secured, and appropriate standard operating procedures (SOPs) should exist to regulate access to them. Direct access to database servers should be restricted to individuals who are responsible for monitoring and backing up the system. All other access to database servers should be controlled by logical security and should occur across a secure network protected by password access and appropriate system controls.

Special considerations must be given to the physical security of computers that are used for electronic data collection during a clinical trail. Whenever data are entered into a central database using a network connection, the physical security of the central server, most likely hosted by the sponsor or a vendor, is a primary consideration. If any data are stored locally at the study site before being sent to a central server (as is the case with a hybrid or “offline” system), the physical security of the system at the source of data entry is more critical. In either case, care must be taken to ensure the physical and logical security of computers that are used to store clinical data for any period of time.

Passwords and access-permission controls are vital to ensure that only authorized personnel may access study data. An administrator designated by company policy should assign permissions on an as-needed basis. Mechanisms should be implemented to capture and prevent unauthorized attempts to access the system. If such an attempt takes place, the administrator should be notified immediately. A procedure should be established describing best practices for the selection of passwords and the frequency that passwords should be changed. Passwords should never be shared among individuals or study teams. These operating procedures are designed to minimize the opportunity for data corruption via accidental or intentional manipulation of the electronic raw data.

To maintain compliance with Code of Federal Regulations Title 21 Part 11, trials that use electronic data collection and management will necessarily regard a user’s authentication (i.e., user name and password) as the user’s electronic signature. All data entry and modification should be captured and stored in an audit trail (user name, date and time stamps) that regards the electronic signature as evidence of the user’s authority to alter information in the clinical database.

Electronic Storage and Warehousing

In addition to access controls, database design and organization are important considerations for a thorough data storage system. Database validation and associated documentation is the cornerstone of a secure and reliable system.

All database validation and user acceptance documentation should be readily available to the study personnel to ensure that all database functions being performed on a study have been validated for quality and reliability. Additionally, consideration should be given to ensure that project team access to clinical data is sufficient to expedite efficient and high-quality interim reporting, data-metrics evaluation, and safety-reporting requirements (see the Safety Data Management and Reporting chapter and the Measuring Data Quality chapter).

The need for thorough validation and trial database design is even more critical for trials utilizing electronic data collection. If a software malfunction or unintended loss of information occurs, data collected on paper CRFs can be re-entered. Because electronic data collection eliminates paper documents as an intermediary step between the study observations and the database, it is critical that database validation and reliability issues are resolved on the validated system prior to the entry of any study data. As electronic data entry moves closer to the point of patient care, electronic information more often will be the source data and, as such, require protection and secure warehousing.

Data Archival

Several archival procedures should be followed to ensure that the data are preserved in their raw format. Most importantly upon completion of a study, the database itself should be locked. That is, permissions to further modify the data should be removed from all except the most critical study personnel. A thorough study archive includes all of the following:

Recommended Standard Operating Procedures

In addition to SOPs, please also reference the chapters on Database Validation, Data Entry and Data Processing, and Database Closure. The following SOPs are recommended as a standard for controlling database storage and archival:

It is also advisable for investigational sites to maintain their own SOPs related to physical and logical computer security.