Audit Trails and Data Change Control in Computerized Systems
1. Purpose and Control Objective
Audit trails and data change controls ensure that all GMP-relevant data creation, modification, and deletion activities are recorded, traceable, and reviewable.
These controls establish:
- visibility of who performed an action
- visibility of what changed and when
- preservation of original data and associated metadata
- ability to reconstruct the sequence of events affecting a record
They are the primary mechanism for ensuring traceability and detecting unauthorized or inappropriate data manipulation.
2. Regulatory Context and Compliance Basis
Audit trail and data change controls are required under 21 CFR Part 11 and support expectations defined by ALCOA+ Principles.
Regulatory expectations require that:
- changes to electronic records are recorded automatically
- original data is preserved and not overwritten
- audit trails are secure, computer-generated, and time-stamped
- audit trails are available for review
- controls prevent undetected data manipulation
This article defines how these expectations are implemented as system-level controls.
3. Audit Trail Control Principles
Audit trails must be:
- automatically generated by the system
- independent of user control
- permanently associated with the underlying record
- protected from modification or deletion
- time-stamped using controlled system time
Manual logs or user-maintained records are not acceptable substitutes.
Audit trails must function as an integral system control, not as an optional feature.
4. Scope of Audit Trail Coverage
Audit trails must capture all GMP-relevant events. Typical required coverage includes:
- creation of records
- modification of data values
- deletion of records or data elements
- changes to system configuration and parameters
- changes to user roles and permissions
- execution of electronic signatures
- system-generated actions affecting data
The scope must be defined based on risk and intended use, but must not exclude critical data or actions.
5. Required Audit Trail Content
Each audit trail entry must capture:
- user identity
- date and time of the event
- type of action performed
- previous value
- new value
- reason for change where applicable
Entries must be complete and unambiguous.
The system must ensure that audit trail data allows reconstruction of the full history of a record.
6. Data Change Control Mechanisms
Systems must control how data can be changed. Required controls include:
- restriction of data modification based on user roles
- prevention of direct overwrite of original data
- implementation of controlled edit or versioning mechanisms
- mandatory justification for data changes where applicable
- enforcement of electronic signatures for critical changes
Data changes must be intentional, controlled, and traceable.
7. Protection of Original Data
Original data must be preserved. System requirements:
- original values must remain visible or retrievable
- no permanent overwrite without traceability
- linkage between original and modified values
- preservation of metadata including timestamps and user identity
Loss of original data constitutes a critical data integrity failure.
8. Audit Trail Review Requirements
Audit trails must be actively reviewed. Review controls must ensure:
- routine review of audit trails for critical processes
- review triggered by data changes, deviations, or investigations
- verification that changes are justified and authorized
- identification of unusual or unauthorized activity
Audit trail review is not optional. It is a required control activity.
9. System Behavior Requirements
The system must enforce:
- automatic capture of all defined events
- prevention of audit trail modification or deletion
- synchronization of system time across audit trail entries
- secure storage of audit trail data
- availability of audit trail for review without data alteration
- linkage between audit trail and associated records
Audit trail functionality must be consistent and tamper-evident.
10. Qualification and Verification Strategy
Audit trail functionality must be verified during system qualification, primarily within Operational Qualification. Testing must include:
- confirmation that audit trail entries are generated for all relevant events
- verification of captured fields including user, timestamp, and values
- confirmation that original and modified values are recorded
- attempted modification or deletion of audit trail data
- verification of system time accuracy and consistency
- confirmation of audit trail linkage to records
- verification of audit trail availability and readability
Testing must include both normal operation and challenge conditions.
11. Procedural Controls and Governance
System controls must be supported by procedures. Required procedures include:
- audit trail review procedure
- definition of review frequency and scope
- assignment of review responsibilities
- escalation and investigation of identified issues
- retention and archival of audit trail data
Procedures must ensure consistent execution and documentation of review activities.
12. Failure Modes and Compliance Risks
Common failures include:
- audit trails not enabled or partially enabled
- incomplete capture of critical events
- lack of review or ineffective review practices
- inability to reconstruct data history
- audit trail data not linked to records
- system time inconsistencies
- excessive reliance on vendor defaults without verification
These failures compromise traceability and regulatory compliance.
13. Documentation and Evidence Requirements
The following documentation must be maintained:
- definition of audit trail scope
- configuration records showing audit trail settings
- procedures for audit trail review
- evidence of audit trail testing
- audit trail review records
- investigation records related to audit trail findings
Documentation must demonstrate that audit trail controls are implemented, functioning, and routinely reviewed.
14. Relationship to Other Data Integrity Controls
Audit trails and data change controls define:
- what actions occurred
- how data changed
- when changes occurred
- who performed those actions
They operate together with:
- access control and electronic signatures, which define who is authorized to act
- data lifecycle controls, which define how data is created, stored, and retained
These controls must remain distinct but coordinated.
15. Conclusion
Audit trails and data change controls provide the traceability foundation required for data integrity in GMP computerized systems. They must be:
- automatically generated
- complete and accurate
- protected from alteration
- routinely reviewed
- verified through qualification
Without effective audit trail and data change control, the reliability and reconstructability of electronic records cannot be ensured.

