It’s clear that there is no substitute for proper planning before undertaking computer system validation. Once owners, deliverables and checkpoints are in place, validation can actually be a streamlined and smoothly accomplished.
In the validation of moderate and relatively low-risk systems, a risk-based approach is also the ideal way to gain efficiencies. To evaluate a simple method to establish system risk level.