CSV Back-Up
CSV Back-Up
Quality Assurance (QA) auditors have a valuable skill set for addressing issues and solving problems
beyond a narrow interpretation of their responsibilities as defined in the regulations. QA auditors’ ability
to assess risk, perform gap analysis, and require rigorous documentation of procedures is beneficial across
many areas of the business. Since companies routinely use electronic data and electronic files as part of their
regulated work, QA auditors are consulting and participating as team members on projects to determine
appropriate back-up procedures for computerized systems and servers holding information related to or
associated with regulated research and manufacturing. This article provides the QA auditor with points to
consider during an evaluation of various backup and restore processes.
A backup of a facility’s electronic data should retain information in an accessible way. Obviously, a backup
would not be successful if a trained individual were unable to quickly find, access, and restore all or part
of the information available from that backup. Retaining accessibility to information in a backup can be
particularly difficult when differences in media types and software constraints are taken into consideration.
Various types of media may be employed when retaining computer backups such as: separate servers,
external hard drives, magnetic tapes, magnetic disks, optical disks, flash memory, CDs and DVDs. Each
of these media types could be utilized, and each has its own issues and considerations when dealing with
Cite as: Ulrey, A., James, C. Points to Consider: Backup and Restoration Processes. Charlottesville, VA: Society of Quality Assurance; 2017. SQA
Technical Document 2017-5
Copyright 2017 Society of Quality Assurance. The information in this document may not be reprinted without approval of SQA.
NOTE: IT staff may refer to ‘RPO’ (Recovery Point Objective) and ‘RTO’ ( Recovery Time Objective).
RPO is defined as the maximum targeted period in which data might be lost due to a major incident. For
example, if backups are performed weekly, an RPO could be up to 7 days. That is, 7 days data could be lost
in the event of a disaster. An RPO of 15 minutes would require incremental backups to be performed every
15 minutes. RTO is defined as the targeted duration of time in which a business process must be restored
after a disaster in order to avoid unacceptable consequences associated with a break in business continuity.
In other words, the length of time that the business can sustain operations from the time that a system
disruption occurs and the time in which it is restored to a functional state. An RTO of 24 hours would mean
that the business can sustain operations for a period of one day while waiting for the system to be restored.
An RTO of 15 minutes would require a restoration process that must be completed within 15 minutes. A
short RTO typically results in greater redundancy built into the backup and restore process and subsequently
drives up cost. An auditor should review the RPO and RTO settings with the business and IT staff to ensure
that they are appropriately aligned and agreed to by both parties.
Another point to consider regarding scheduling backups is whether or not to perform a “hot” or “cold”
backup. Hot backups occur when the system being copied is still running. This type of backup is particularly
prevalent when a frequent incremental backup schedule is being utilized. System performance issues or
effects, such as slow downs, should be considered when scheduling hot backups. The treatment of files that
are open or in-use during the time of the backup also needs to be determined. Cold backups occur when the
system is off-line during the file copy process.
Backup Restoration
A process should be in place for the periodic restoration of backed-up data to verify backup integrity and
consistency. Consider the type of media used to store the backup. For example, where magnetic tape is used
for backup, consider write protection to prevent modification of the backup during restoration activities. The
data restoration process should be tested during validation and periodically verified to ensure the continued
integrity of data and physical media. The process should also include how data restoration is requested,
whether it be via electronic or paper, within the system or outside through an IT ticket.
Consider the software, proprietary or otherwise, used to create condensed back-up files. The same software
will also be required for restoration, quite possibly even the same version number. In this case, it is critical
to maintain licensing agreements with the vendor. Hardware should also be kept in mind. If magnetic tapes
are used to store back-ups, periodic exercising should be included as part of the back-up procedures to
protect against physical degradation and adherence of the tape to itself. The manufacturer of the back-up
media used, for example known CD manufacturers vs. a generic brand, should also be a consideration when
determining the necessity and frequency of back-up restoration testing.
Over time backup procedures can amass quite a bit of data, whether it is stored in external media or on a
server. Procedures should be developed for the secure disposal of backups that are no longer necessary.
Most services charge based on the total size of the information being held, and a planned destruction of
backups can aid in cost savings for the company. In addition, the company may need to consider the legal
implications of retaining older back-ups. Records in these backups likely fall under document retention
policies from both regulatory compliance and legal groups.
It is important to maintain security during the backup destruction process. There is less work involved
in maintaining data security when deleting files from a server than there is in destroying a tape or other
removable media used in backup processes. Both scenarios would require documentation of the successful
secure destruction process.
Backups may only be retained for a short period of time, for example 60 or 90 days, for the purpose of data
recovery whereas archived data is stored in a separate location for long-term retention as required by the
regulations.
It should be clear who has access to the backup and who is responsible for monitoring the performance of
it. The person responsible for the backup is likely not an archivist but an IT professional. It is crucial this
person or group understand the type of information on the system they are supporting and the regulatory
requirements surrounding it. They should understand that periodic checks need to be made on the system
to show the backups are occurring as scheduled and are successful. Maintain documented evidence for
when these checks are conducted to show proper functionality. Are GLP documentation principles being
followed? If IT is responsible for the backups, they need to have sufficient training for the applicable
regulatory environment and in the appropriate documentation practices, so that compliant records are
maintained.
Auditors should investigate the process of bringing a new system into the regulated environment. IT (or
whomever is responsible for network backups) should be made aware of the commissioning to assure the
system is incorporated into the backup process. There is a high risk involved in releasing a new technology
into the production environment. It is conceivable that newly installed systems could crash shortly after
installation and during investigation it is discovered that all information captured between installation and
the crash was only being saved locally and was not included in the network backup procedures. A scenario
like this could be potentially devastating for a study. It is worth the effort to make sure all responsible parties
are made aware of new system commissioning. Oftentimes the IT department is responsible for the overall
network backup, but standalone systems may be the responsibility of management within the laboratory
utilizing the system. It is important that the process of adding new systems into the regulated environment
include some discussion of data capture and backup procedures and how they will be handled for standalone
systems (including who will be responsible). Incorporating backup and restoration in the system specific
validation process is ideal so that the process is identified early and incorporated into each system’s standard
operating procedure, regardless of whether a standalone, networked configuration, or cloud solution is used.
When performing general study audits, be mindful of where electronic data are being retrieved for review. Is
it standard practice to pull the archived copy of the electronic data for review, or are the files being retrieved
from the backup instead? It is important to assure there is a process in place to obtain the official archived
data (rather than the backup) and that all employees understand the difference between the electronic archive
and the backup and when it is appropriate to access each. Auditors have observed instances where a backup
copy transitioned into use as the official archived copy due to corruption of the original. In a case like this,
there should be some documentation indicating what happened to the original data and showing that the
backup was copied or restored and verified for official regulatory use.
In conclusion, there are several points to consider when implementing backup procedures within an
organization. The type of computerized system, amount and type of data being collected, and the associated
media types to maintain the original raw data are critical to evaluate as part of the process of determining
the appropriate backup procedures. The degrees of backup used, whether as part of a combination or
independent strategy, as well as adequate frequencies for the particular type of backup should be considered
when evaluating each computerized system to minimize the risk of losing data while keeping processes
cost effective and relatively labor-less. Maintaining the backup at a geographically different location in
conjunction with periodic restoration exercises via recovery drills as well as appropriate rotation of outdated
media enhances disaster recovery efforts. Quality Assurance personnel should be knowledgeable of the
documented processes and periodically monitor them to assure robust, tested procedures are in place to
safeguard an organization’s electronic records and intellectual property.