Applying Annex 11 Principles to eTMF Systems

Rethinking “State of Control” in a Cloud-Driven Clinical Environment

Why Annex 11 Matters for eTMF — Even Outside GMP

By Kathie Clark, Industry Expert; Technology & Innovation Partner, Just in Time GCP

The new draft of EMA’s Annex 11 of the EU GMP guidelines governs computerized systems used in manufacturing environments. However, its principles—lifecycle validation, data integrity, access control, and supplier oversight—are increasingly relevant to clinical systems like the electronic Trial Master File (eTMF). 

Modern eTMF platforms are: 

  • cloud-hosted and vendor-managed, with frequent push updates and configurable features 
  • used by multiple stakeholders, including sponsors, CROs, and affiliates 
  • subject to inspection, where regulators expect traceability, data integrity, and sponsor accountability 

Additionally, while the eTMF is not a GMP system, it is a regulated repository of essential documents supporting trial conduct, regulatory submissions, and inspection readiness. Applying Annex 11’s rigor to eTMF operations helps sponsors maintain control, mitigate risk, and ensure defensibility, especially in decentralized, multi-tenant environments. 

To understand Annex 11’s relevance, it helps to consider how regulators define system control. 

What Is a “State of Control”? A Regulatory Perspective

ICH Q10 defines a state of control as: 

“A condition in which the set of controls consistently provides assurance of continued process performance and product quality.” 

In addition, FDA guidance signals a system may be out of control when: 

  • validation is incomplete or outdated 
  • deviations are not investigated 
  • CAPAs are missing or ineffective 
  • oversight is fragmented or undocumented 

For eTMF environments, this means maintaining a system that consistently supports: 

  • document integrity 
  • access governance 
  • auditability 
  • validation 
  • oversight 

Sponsors must be able to demonstrate that their eTMF, even when vendor-hosted, is operating in a controlled, validated, and inspection-ready state. 

Validation Responsibilities for Configured Cloud eTMF Systems

As a result, sponsors using cloud-based eTMF platforms must go beyond relying on vendor-supplied validation. Maintaining a validated state typically involves the following key activities. 

Sponsor-Led Validation Activities

Activity
Description

 

URS
Ownership

Define and maintain a User Requirements Specification (URS) reflecting sponsor-specific workflows, metadata, and compliance needs. It may be based on a vendor-supplied URS, but Annex 11 makes clear: 

“This principle should be applied regardless of whether a system is developed in-house, is a commercial off-the-shelf product, or is provided as-a-service.” 

Risk-Based Testing

Prioritize validation of high-risk features such as audit trails, access controls, document versioning, e-signatures, and inspection-readiness reports. 

Release Impact Assessment 

Review vendor release notes and assess the impact on validated workflows. Document the rationale for regression testing and determine whether additional testing or conditional approvals are required. 

Supplemental Testing

Perform sponsor-led testing for configured features or workflows not covered by vendor scripts. 

Conditional Validation 

When full testing is not feasible before a release, document conditional approval with defined follow-up actions. 

Traceability Matrix 

Maintain traceability between requirements, test cases, and validation evidence—particularly for critical features. 

Enhanced Vendor Audit Expectations

Annex 11 emphasizes supplier oversight. For eTMF vendors, sponsors should treat audits as strategic compliance tools, not just checkboxes. 

What a Robust Vendor Audit Should Cover

Blue arrow pointed right with fading tail

Validation Package Review: Assess whether vendor validation aligns with sponsor configuration and regulatory expectations. 

Blue arrow pointed right with fading tail

Release Management: Evaluate how updates are tested, documented, and communicated, including rollback procedures. 

Blue arrow pointed right with fading tail

Security Controls: Review authentication methods, password policies, encryption, and patching cadence. 

Blue arrow pointed right with fading tail

Audit Trail Functionality: Confirm that audit trails are immutable, searchable, and exportable. 

Blue arrow pointed right with fading tail

Data Governance: Assess backup, archival, and data migration protocols. 

Blue arrow pointed right with fading tail

Inspection Support: Ensure vendor readiness to support the sponsor during health authority inspections. 

Blue arrow pointed right with fading tail

Exit Strategy: Confirm sponsor access to data and metadata in case of vendor transition or contract termination. 

Translating “Alarms” to eTMF: Signals of Risk, Not Sirens

In Annex 11, alarms are literal—triggered when a system detects a condition that may compromise product quality, patient safety, or data integrity. In eTMF environments, the equivalents are not flashing warnings, but signals that something requires attention. 

eTMF “Alarms” Might Include:

  • overdue expected documents (e.g., missing ICFs, unfiled monitoring reports) 
  • unacknowledged quality issues (e.g., duplicates, misfiled artifacts) 
  • unreviewed audit trail entries for critical actions 
  • unresolved system errors (e.g., failed uploads, metadata mismatches) 
  • unacknowledged system notifications (e.g., failed migrations, permission changes) 

Therefore, these “soft alarms” should be: 

  • logged in a way that supports traceability 
  • reviewed periodically to detect trends or systemic issues 
  • acknowledged by authorized users, with rationale documented 
  • linked to CAPA where appropriate 

Sponsors should treat these eTMF signals with the same seriousness as GMP alarms.  They do not impact product quality directly, but they indicate breakdowns in documentation integrity, which regulators increasingly scrutinize. 

Annex 11 Principle
eTMF Application
Sponsor Responsibility

 Lifecycle Validation

System remains validated across updates 

Maintain URS, perform risk-based testing, document conditional approvals 

System Requirements 

Configured workflows and metadata tagging 

Own and update URS, trace requirements to validation 

Risk Management 

Prioritize controls for high-risk documents (e.g. ICFs, safety reports) 

Conduct risk assessments, tailor validation scope 

Supplier Oversight 

Vendor manages hosting, updates, and support 

Audit vendor, define SLAs/KPIs, ensure inspection readiness 

Identity & Access Management 

Role-based access across sponsor, CRO, and affiliates 

Enforce least privilege, conduct periodic access reviews 

Audit Trails

Track who/what/when/why for document actions 

Review audit trails, document procedures, ensure QP access 

Electronic Signatures

Used for approvals and document finalization 

Validate signature workflows, ensure regulatory compliance 

Handling of Data

Migration, transfer, and encryption of trial documents 

Validate data flows, secure backups, document archival 

Periodic Review 

System health, alarm logs, and audit trail trends 

Conduct CAPA-linked reviews, escalate findings to management 

Final Thoughts: Accountability Is Not Optional

Annex 11 reinforces a core principle: 

“When using outsourced activities, the regulated user remains fully responsible for adherence to the requirements… for maintaining the evidence for it, and for providing it for regulatory review.” (Section 2.6) 

This is especially relevant for eTMF systems where vendors manage hosting, updates, and even validation artifacts. Regardless of how much is outsourced, the sponsor remains accountable for ensuring the system is validated, secure, and inspection-ready. 

In summary, by applying Annex 11 principles to eTMF oversight, sponsors can: 

  • strengthen inspection readiness 
  • reduce compliance risk 
  • improve cross-functional accountability 
  • ensure defensibility of trial documentation 

By Kathie Clark, Industry Expert; Technology & Innovation Partner, Just in Time GCP

Kathie is an integral part of Just in Time GCP’s growing innovation team.  As Founder & CEO, Donna Dorozinsky has said “Kathie offers a strategic vision for innovative technology application that embraces AI and clinical data analytics, allowing Just in Time GCP to translate increased quality and efficiencies to our partners.”  Click here to learn more about how Kathie and Just in Time GCP are applying AI with purpose, not hype, and realizing results.