CRP 109 Lecture 5 Flashcards
Data Management Plan (DMP)
Written document that describes
the process for collecting and
managing data throughout the
life of a study
Road map to handle the data
Auditable document
Developed specifically for each
study
Must comply with regulations,
local laws, and organizational
SOPs
Describes clinical data management activities to be followed
in the trial:
Personnel and roles
Database design
Data collection
Data entry
CRF tracking
Medical coding
Data validation
Query/discrepancy management
Database lock
Tools when Writing a DMP
Study protocol
Study contract
Monitoring plan
CRFs
Data from external sources (laboratory data, genetics report)
Updating a DMP
When study protocol is amended
Addition/removal of a site
Changes to CRFs
When data handling procedures change
Yearly; review by data manager
Back Up Operations
Disaster recovery in the event that randomization process
malfunctions via a hardware/power failure
Should be defined in the Data Management Plan
Back up is typically a paper-based process
i.e. hard copy of randomization list maintained with the statistician
Data cleaning
Usually done post data entry but
data should be reviewed for a few subjects from every site at the
beginning of the study to identify EDC system problems or study team
member understanding; and
at all stages through the data collection phase of a study (EDC systems
help to make this faster/easier)
Important for end users to understand how EDC data checks
are attached to data fields
Ensure clean data gets “locked” in the EDC system
Ensure audit trail is tracking all data changes
types of Data Cleaning
Manual review of data
Data entry errors (missing, typographical, copying, coding and range errors)
Queries, monitoring visits
Computer checks
Inaccurate or invalid data using ranges, missing data, protocol violations and
consistency checks
Edit checks
Descriptive Statistics
Unusual patterns in data
Data conversion errors
Deviations/Violations trending (frequency of missing data)
Excluding patients from analysis
Detecting outliers
database maintenace
Source Data Verification
Changes to data fields:
Testing & UAT
Security:
Digital signatures
Data Archiving
Software:
Version control
Periodic backups of all application and system data
Regular installation of updated software patches
User management and authorization
Policy
- Guiding principle used to set direction
- The ‘what’
Procedure/SOP
- Series of steps to be followed
- The ‘how’
Audit Trail
A secure, computer generated, time-stamped electronic record that allows reconstruction of the course of events relating to the creation, modification, and deletion of an electronic record
-Protects the authenticity, integrity, and the confidentiality of electronic records
-Must be retained for at least as long as that required for the subject electronic records, and must be available for
inspectors/auditors