金币
UID25184
帖子
主题
积分215562
注册时间2012-4-1
最后登录1970-1-1
听众
性别保密
|
发表于 2017-3-20 09:56:45
|
显示全部楼层
21CFR11的一个指南,对于时间印章的安全性规定如下
5.2. Systems Clock Security
You should be able to detect inappropriate changes to computer clocks. You
should establish and follow procedures to detect and deter inappropriate
changes to computer clocks. For example, employees should be made aware
that unauthorized changes to clock settings are serious and unacceptable
actions. We believe employee training and awareness programs are especially
important where computer systems lack a technical means of preventing people
from changing clock settings. For example, in general, laptop computers lack a
means of preventing clock changes.
Persons responsible for system security should periodically conduct
unannounced checks of computer clocks to detect and deter unauthorized clock
changes. In addition, time stamps on electronic records should be spot checked
for anomalies that might indicate inappropriate clock settings. For example, if the
time stamps in an audit trail show a date and time of record modification that is
earlier than the date and time of record creation, this discrepancy might indicate
that there have been unauthorized clock modifications. |
|