How To Create A Bulletproof URS
How To Create A Bulletproof URS
Over the last number of months it has become quite apparent to us at Askaboutvalidation.com that many of you out there are finding it difficult to create URS documents (for the beginners out there User Requirement Specifications). So where are people going wrong with this initial phase. How hard can it be to create a document detailing what exactly you want a system or piece of equipment to do?
The nightmare of developing a bullet-proof URS The answer is, it can be very difficult if you dont really know in the first place what exactly you want the system/application/equipment to do. We have put together our top 22 tips for developing a bullet-proof URS. We hope you find the follwoing tips helpful!
1. Requirements
Requirements may be developed internally by the supplier (in the case of product development). Requirements also may be provided by customers (for a configured product, custom application, or a service. The requirements should define clearly and precisely what the system should do and state any constraints. Requirements should be reviewed and approved by the stakeholders and the subject matter experts.
Changes to requirements should be controlled. Changes to subsequent specification documents that affect the requirements should lead to an update of the requirements.
6. Configured Products
For configured products and custom applications, the regulated company should describe the business processes to be automated. In the case of configured products, these processes should be aligned with the functionality of the product to be used.
8. Specifications
For product development the supplier should document the functionality and design of the system to meet the defined requirements. This should cover software, hardware, and configuration. Functional specifications should clearly and completely describe what the product can do. They should be produced such that objective testing can be subsequently performed.
order to identify key requirements of the system are related to the business or manufacturing process.
Company overview including any product-specific locations Organisation, roles and responsibilities, staff training and experience Key products and/or service history and development plans QMS implementation at company level and for product-related processes Development life cycle processes and deliverables Development lifecycle support processes Service delivery process User training Product support/maintenance Security Use of sub-contractors
Operational requirements Functional requirements Data requirements Technical requirements Interface requirements Environmental requirements Availability requirements Security requirements Maintenance requirements Regulatory requirements Migration of any electronic data Constraints to be observed Life cycle requirements
Prioritize with emphasis on identifying the mandatory requirements. Classify them as you see fit:
21. Ownership
Ownership of requirements lies with the regulated company. Without user ownership the business operational needs and any associated issues can never be fully understood and captured. Documented requirements from the basis for acceptance of the system by users. Subject Matter Experts (SMEs), including those fro third parties, may help both the user and technical communities analyse and understand the operational needs and develop and document appropriate requirements.
A common understanding of the requirements among team members should be established. All required levels of the business should be involved during requirement capture. Ambiguous requirements should be avoided and, where possible, requirements should be measurable. Requirements should be classified to ensure that appropriate focus is given to critical requirements. Functionality that will not be used should be avoided. The original scope should be maintained, extending the scope should be possible only through a formal change control process. An effective and efficient change management process should be implemented, incorporating impact assessment of changes based on risk, and formal version control. Multiple requirements within a single requirement should be avoided.