All systems are developed in compliance with FDA recommendations for IT systems used in clinical trials as well as 21 CFR Part 11 requirements, including:

Standard operating procedures
Records management
Access restriction
Documented records of all activities
Date and time records
Safety measures
Data management contro
Personnel training
Management of electronic signatures and records

Server infrastructure

We use cutting-edge technologies and modern server equipment, which allows us to ensure high efficiency of our work. In order to ensure uninterrupted activity, we implemented a distributed data storage system, which allows us to continue working even if individual system components are temporarily damaged. Even in the case of physical destruction of one of our servers our work will not be disrupted. If two or more storage centers are damaged, we will restore an acceptable activity level within 24 hours and full activity within 72 hours.

Collaborative work

To optimize information exchange and to increase teamwork efficiency we use specialized tools for collaborative activities.

Reserve data storage

In order to protect data from damage or loss, we use modern and reliable software, which allows us to create backup data copies as per the GFS system. To ensure maximum data availability, we follow the leading protocol to 3-2-1 security:

  • maintain at least 3 copies of the data and applications;
  • store backup copies on at least 2 different types of storage facilities;
  • keep 1 set of backup copies in a different location.

  • In addition to our backup copy servers, our data is stored in international data centers of Tier Level 4 security.

    Work station verification

    We conduct installation and validation checks for a certain list of software. This allows us to ensure that the software is properly installed and works correctly

    Antivirus protection

    We use modern antivirus software in order to protect information on our file and mail servers, work stations and mobile devices. For further mail server safety, we apply reliable spam filters.

    Access management

    In order to limit access to our systems, we implemented a two-factor authentication system for a certain list of software. This significantly increases security level compared to the use of traditional passwords.