Blog

RESOURCES / BLOG

Why Audit Trails Are a Great Feature of LIMS

Audit trails are a common LIMS feature required for regulated laboratories, but they are generally a useful tool for any laboratory – regulated or not. For those of you who are new to LIMS,

Read More...

Is Your LIMS Good Enough? Where LIMS Adds the Most Value for Labs

 

When you’re working in a fast-paced environment such as a laboratory, you might not have the time to implement improved ways of working.  You may be using an existing LIMS, and are used to the workarounds and quirks of the system. 

Read More...

4 Signs Your Lab Has Outgrown Your LIMS

Many laboratories introduce LIMS to help with sample data management and reporting.   Some labs will have used the same system for 12 years without upgrades, and other labs will

Read More...

The Best LIMS Features for Quality

The purpose of quality is to ensure standards are maintained so that products, services and processes are effective and fit for purpose. Laboratories must maintain high quality standards to provide confidence in

Read More...

What the Regulators are Looking for in a LIMS Validation Plan

Validating LIMS is a fundamental requirement for GMP compliance.  Where LIMS is used to store and process GMP data, it is imperative that

Read More...

Computerised Systems: A Summary of 2016 MHRA Inspections

The Medicines and Healthcare products Regulatory Agency (MHRA) has a responsibility to protect public health by ensuring that medicines and medical devices meet applicable standards of safety, quality and efficacy. Each year, they conduct

Read More...

Is My Audit Trail Regulatory Compliant?

Operating a laboratory within regulatory requirements can be a challenge.  The wording of regulations is typically cryptic, and there’s always room for different interpretations.  Audit trails are an important factor for compliance because

Read More...

Don't forget this when addressing data integrity!

Read More...

Four Common Misconceptions about Data Security

In this article we discuss four of the most common misconceptions about data security.

#1 "Desktop is more secure than web applications."

Desktop programs run locally on a PC whereas web applications run in a web browser via the internet.  Most people believe data stored through a desktop program is more secure than browser based applications because the perceived control over data. Not all desktop programs store data within the local network.  Some desktop programs access, send and store data on remote servers which is the same data storage method as web applications.

Read More...

Our Founder Dr. Paul Moran, Leading the way in Data Integrity

Read More...