Computerized units must have adequate controls to stop unauthorized access or changes to info. There really should be controls to avoid omissions in knowledge (e.You will find 3 ways to validation. Prospective validation is the preferred approach, but you'll find cases wherever the other ways can be used. These ways and their applicability are disc