Trust and Privacy

Security

Quality and Compliance

Privacy

Security

eClinical Solutions’ security, risk and compliance programs are built around industry recognized cyber security standards and practices. eClinical Solutions follows a rigorous information security program which includes:

  • Robust User Identity Access Management
  • Proactive System Monitoring and Management
  • Cyber Security Awareness Training & Risk Assessments
  • Detailed Business Continuity and Disaster Recovery Plans

Quality and Compliance

eClinical Solutions recognizes its regulatory/guidance compliance responsibilities when providing services to our clients. Specifically, we:

  • Model our Quality Management System against the standards of ICH E6(R2) – Guideline for Good Clinical Practice and associated FDA regulatory Guidance for Industry
  • Comply where applicable to regulatory requirements including 21 CFR Part 11, EU Annex 11, HIPAA, GDPR, and Relevant State Laws
  • Understand the implications of the computerized systems used in Clinical Investigations guidance when implementing systems for clients or eClinical Solutions business needs
  • Our elluminate® product has been designed to comply with standards and requirements set forth in FDA 21 CFR Part 11, Electronic Signatures and Records. Furthermore, we ensure the application is hosted in a secure fashion and maintained in a state of control following a defined Software Development Lifecycle and Computer System Validation process for each release.

Privacy

eClinical Solutions complies with all applicable data privacy laws. We partner with our clients and expect that the Data Controller is in the best position to know and identify where their data is coming from. While eClinical Solutions is EU and Swiss Privacy Shield Certified, understanding the current unknown future of Privacy Shield, we also enter into Standard Contractual Clauses (SCCs) to ensure continued compliance with the General Data Protection Regulation (GDPR).

eClinical Solutions continues to monitor changes to the fluid privacy and security landscape with internal resources from IT, Legal, and Compliance as well as outside experts in this area.

Scroll Up