GUIDELINES ON VALIDATION APPENDIX 5 VALIDATION OF .

2y ago
188 Views
6 Downloads
811.69 KB
24 Pages
Last View : 17d ago
Last Download : 3m ago
Upload by : Samir Mcswain
Transcription

Working document QAS/16.667/Rev.1May 2018Draft document for comments1234GUIDELINES ON VALIDATION – APPENDIX 5VALIDATION OF COMPUTERIZED SYSTEMS(May 2018)56789101112131415161718192021222324DRAFT FOR COMMENTSShould you have any comments on the attached text, please send these toDr S. Kopp, Group Lead, Medicines Quality Assurance, TechnologiesStandards and Norms (kopps@who.int) with a copy to Ms Xenia Finnerty(finnertyk@who.int) by 20 June 2018.Medicines Quality Assurance working documents will be sent outelectronically only and will also be placed on the Medicines website forcomment under “Current projects”. If you do not already receive ourdraft working documents please let us have your email address and wewill add it to our electronic mailing 7 World Health Organization 2018All rights reserved.This draft is intended for a restricted audience only, i.e. the individuals and organizations having received this draft. The draftmay not be reviewed, abstracted, quoted, reproduced, transmitted, distributed, translated or adapted, in part or in whole, in anyform or by any means outside these individuals and organizations (including the organizations' concerned staff and memberorganizations) without the permission of the World Health Organization. The draft should not be displayed on any website.Please send any request for permission to:Dr Sabine Kopp, Group Lead, Medicines Quality Assurance, Technologies Standards and Norms, Regulation of Medicines andother Health Technologies, Department of Essential Medicines and Health Products, World Health Organization, CH-1211Geneva 27, Switzerland. Fax: (41-22) 791 4730; email: kopps@who.int.The designations employed and the presentation of the material in this draft do not imply the expression of any opinionwhatsoever on the part of the World Health Organization concerning the legal status of any country, territory, city or area or of itsauthorities, or concerning the delimitation of its frontiers or boundaries. Dotted lines on maps represent approximate border linesfor which there may not yet be full agreement.The mention of specific companies or of certain manufacturers’ products does not imply that they are endorsed or recommendedby the World Health Organization in preference to others of a similar nature that are not mentioned. Errors and omissionsexcepted, the names of proprietary products are distinguished by initial capital letters.All reasonable precautions have been taken by the World Health Organization to verify the information contained in this draft.However, the printed material is being distributed without warranty of any kind, either expressed or implied. The responsibilityfor the interpretation and use of the material lies with the reader. In no event shall the World Health Organization be liable fordamages arising from its use.This draft does not necessarily represent the decisions or the stated policy of the World Health Organization.

Working document QAS/16.667/Rev.1page 248495051SCHEDULE FOR THE PROPOSED ADOPTION PROCESS OF DOCUMENT QAS/16.667:GUIDELINES ON VALIDATION – APPENDIX 5VALIDATION OF COMPUTERIZED SYSTEMSDiscussion of proposed need for revision in view of thecurrent trends in validation during informal consultationon data management, bioequivalence, GMP andmedicines’ inspectionPreparation of draft proposal for revision of the main textand several appendices by specialists in collaborationwith the Medicines Quality Assurance Group andPrequalification Team (PQT)-Inspections, based on thefeedback received during the meeting and from PQTInspections, draft proposals developed on the varioustopics by specialists, as identified in the individualworking documents.Presentation of the progress made to the fiftieth meetingof the WHO Expert Committee on Specifications forPharmaceutical PreparationsDiscussion at the informal consultation on good practicesfor health products manufacture and inspection, GenevaPreparation of revised text by Mrs M. Cahilly andDr A.J. van Zyl, participants at the above-mentionedconsultation, based on Mrs Cahilly’s initial proposal andthe feedback received during and after the informalconsultation by the meeting participants and members ofPQT-InspectionsCirculation of revised working document for publicconsultationConsolidation of comments received and review offeedbackPresentation to the fifty-first meeting of the WHO ExpertCommittee on Specifications for PharmaceuticalPreparationsMore than 400 comments were received during thepublic consultation and were evaluated and prioritized bythe German Expert Group on Computerized System withthe kind assistance of Mr MengesThe comments and feedback were discussed and furtherreviewed during the consultation on Good practices forhealth products manufacturer and inspectionThe large number of feedback and comments receivedneeded a major restructuring and reworking, assistancewas sought from experts and PQT-Inspections29 June–1 July 2015July 2015–April 201612–16 October 20154–6 April 2016May 2016May 2016August–September201617–21 October 2016October 2016–April201725–28 April 2017May 2017–December 2017

Working document QAS/16.667/Rev.1page 3Preparation of revised text by Dr Dimitrios Catsoulacosform the PQT-Inspection and Dr Valeria Gigante fromthe Medicine Quality Assurance Group based on thecomments and all the various input receivedCirculation of revised working document for publicconsultationConsolidation of comments received during the publicconsultationPresentation of the revised working document to theWHO consultation on Good practices for health productsmanufacture and inspectionRevision of the draft text on the basis of feedbackreceived during and after the informal consultation by themeeting participants and members of PQT-InspectionsCirculation of revised working document for publicconsultationCompilation of comments received during the publicconsultationPresentation of updated working document to fifty-thirdmeeting of the WHO Expert Committee on Specificationsfor Pharmaceutical PreparationsAny other follow-up action as ne 20185657July 2018585910–12 July 2018 606162July 2018636465July–September 66201867October 2018686922–26 October 2018707172 7374February–April2018

Working document QAS/16.667/Rev.1page TION OF COMPUTERIZED .16.Introduction and scopeBackground informationGlossaryComputerized system validation master plan, protocols and reportsVendor managementRequirements specificationsSystem design and configuration specificationsDesign qualificationBuild and project implementationInstallation qualificationOperational qualificationStandard operating procedures and trainingPerformance qualification and user acceptance testingSystem operation and MaintenanceSystem retirementReferences and further reading

Working document QAS/16.667/Rev.1page 1581591601611621631641651661671681691.BACKGROUND INFORMATIONThe need for revision of the published World Health Organization (WHO) Supplementaryguidelines on good manufacturing practices: validation (1) was identified by the Prequalificationof Medicines Programme and a first draft document was circulated for comment in early 2013.The focus at that time was the revision of the Appendix on non-sterile process validation(Appendix 7), which had been revised and was adopted by the Committee at its forty-ninthmeeting in October 2014 (2).The overarching text, entitled “Guidelines on Validation” (working document QAS/16.666)constitutes the general principles of the new guidance on validation. This working document, theValidation of computerized systems, is the Appendix 5 of the overarching guidances onvalidation.The following is an overview of the appendices that are intended to complement the general texton validation:Appendix 1Validation of heating, ventilation and air-conditioning systems will be replaced by cross-reference to WHO good manufacturing practices for heating,ventilation and air-conditioning systems for non-sterile pharmaceutical products.Appendix 2Validation of water systems for pharmaceutical use will be replaced by cross-reference to WHO good manufacturing practices: water forpharmaceutical use (3).Appendix 3Cleaning validation – consensus to retainAppendix 4Analytical method validation – update in process (working document QAS/16.671)Appendix 5Validation of computerized systems – updated text proposed in this working documentAppendix 6Qualification of systems and equipment – update in process (working documentQAS/16.673/Rev.1)Appendix 7Non-sterile process validation – update already published as Annex 3, WHO Technical ReportSeries, No. 992, 2015.

Working document QAS/16.667/Rev.1page 2032042052062072082092.INTRODUCTION AND SCOPE2.1Computerized systems should be validated in accordance with quality risk managementprinciples and the level of validation should be commensurate to identified risks, complexity andintended use. This guide applies to systems used in good manufacturing practices (GMP) (4)but may be extended to systems used in all good practice (GXP) activities, as appropriate.2.2The purpose of validation is to confirm that the computerized system specificationsconform to the user’s needs and intended use by examination and provision of documented andobjective evidence that the particular requirements can be consistently fulfilled. Validationshould establish confidence in the accuracy, reliability and consistency in performance of thesystem and it should also ensure that all necessary technical and procedural controls areimplemented confirming compliance with good documentation practices for electronic datagenerated by the system (5).2.3System elements that need to be considered in computerized system validation includecomputer hardware and software, related equipment and network components and operatingsystem environment, procedures and systems documentation, as appropriate, including usermanuals. Persons should be appropriately trained and qualified, and including but not limited to,end users, system application administrators, network engineers, database administrators andelectronic archivers. Computerized system validation activities should address both systemfunctionality and configuration as well as any custom-developed elements.2.4Computerized systems should be maintained in a validated state with risk-based controlsfor the operational phase which may include but is not limited to system planning, preparationand verification of standard operating procedures (SOPs) and training programs, systemoperation and maintenance including handling of software and hardware updates, monitoringand review, change management and incident reporting followed by system retirement.2.5Depending on the types of systems or typical applications such as process controlsystems (distributed control system (DCS), programable logic controller (PLC), supervisorycontrol and data acquisition (SCADA)), laboratory information management systems (LIMS),laboratory instrument control systems and business systems (enterprise resource planning(ERP), manufacturing resource planning (MRP II)) used by the manufacturer, documentationcovering, but not limited to, the following information should be accessible on-site: purpose and scope;roles and responsibilities;validation approach;risk management principles;

Working document QAS/16.667/Rev.1page 7 210system acceptance criteria;vendor selection and assessment;computerized system validation steps;configuration management and change control procedures;back-up and recovery;error handling and corrective action;contingency planning and disaster recovery;maintenance and support;system requirement;validation deliverables and documentation; template, formats, annex; 412422432442452462472482493.GLOSSARYThe definitions given below apply to the terms used in these guidelines. They may have differentmeanings in other contexts.archival. Archiving is the process of protecting records from the possibility of beingfurther altered or deleted, and storing these records under the control of independent datamanagement personnel throughout the required retention period. Archived records shouldinclude, for example, associated metadata and electronic signatures.audit trail. The audit trail is a form of metadata that contains information associated withactions that relate to the creation, modification or deletion of GXP records. An audit trailprovides for secure recording of life-cycle details such as creation, additions, deletions oralterations of information in a record, either paper or electronic, without obscuring oroverwriting the original record. An audit trail facilitates the reconstruction of the history of suchevents relating to the record regardless of its medium, including the “who, what, when and why”of the action.For example, in a paper record, an audit trail of a change would be documented via a single-linecross-out that allows the original entry to remain legible and documents the initials of the personmaking the change, the date of the change and the reason for the change, as required tosubstantiate and justify the change. In electronic records, secure, computer-generated, timestamped audit trails should allow for reconstruction of the course of events relating to thecreation, modification and deletion of electronic data. Computer-generated audit trails shouldretain the original entry and document the user identification, the time/date stamp of the action,as well as the reason for the change, as required to substantiate and justify the action. Computergenerated audit trails may include discrete event logs, history files, database queries or reports or

Working document QAS/16.667/Rev.1page 283284285286287288289other mechanisms that display events related to the computerized system, specific electronicrecords or specific data contained within the record.automatic or live update. It is used to bring up to date software and systemfunctionalities in a silent or announced way. More specifically the update takes placeautomatically with or without the user's knowledge.backup. A backup means a copy of one or more electronic files created as an alternativein case the original data or system are lost or become unusable (for example, in the event of asystem crash or corruption of a disk). It is important to note that backup differs from archival inthat back-up copies of electronic records are typically only temporarily stored for the purposes ofdisaster recovery and may be periodically overwritten. Such temporary back-up copies shouldnot be relied upon as an archival mechanism.business continuity plan. A documented plan that defines the ongoing process supportedby management and funded to ensure that the necessary steps are taken to identify the impact ofpotential losses, maintain viable recovery strategies and recovery plans and assure continuity ofservices through personnel training, plan testing and maintenance.cloud based. A model for enabling on-demand network access to a shared pool ofconfigurable computing resources (e.g. networks, servers, storage, applications, and services)that can be rapidly provisioned and released with minimal management effort or service providerinteraction. These computing resources should be appropriately qualified.computerized system. A computerized system collectively controls the performance andexecution of one or more automated processes and/or functions. It includes computer hardware,software, peripheral devices, networks and documentation, e.g. manuals and standard operatingprocedures, as well as personnel interacting with hardware and software.computerized systems validation. Confirmation by examination and provision ofobjective and documented evidence that computerized system’s predetermined specificationsconform to user needs and intended use and that all requirements can be consistently fulfilled.configuration management. A discipline applying technical and administrative directionand surveillance to identify and document the functional and physical characteristics of aconfiguration item, control changes to those characteristics, record and report change processingand implementation status and verifying compliance with specified requirements.COTS. Commercial off-the-shelf software; a vendor-supplied software component of acomputerized system for which the user cannot claim complete software life-cycle control.

Working document QAS/16.667/Rev.1page 323324325326327328329data. All original records and true copies of original records, including source data andmetadata and all subsequent transformations and reports of these data, which are generated orrecorded at the time of the good manufacturing practices (GMP) activity and allow full andcomplete reconstruction and evaluation of the GMP activity. Data should be accurately recordedby permanent means at the time of the activity. Data may be contained in paper records (such asworksheets and logbooks), electronic records and audit trails, photographs, microfilm ormicrofiche, audio- or video-files or any other media whereby information related to GMPactivities is recorded.data integrity. Data integrity is the degree to which data are complete, consistent,accurate, trustworthy and reliable and that these characteristics of the data are maintainedthroughout the data life cycle. The data should be collected and maintained in a secure manner,such that they are attributable, legible, contemporaneously recorded, original or a true copy andaccurate. Assuring data integrity requires appropriate quality and risk management systems,including adherence to sound scientific principles and good documentation practices (5).data life cycle. All phases of the process by which data are created, recorded, processed,reviewed, analyzed and reported, transferred, stored and retrieved and monitored until retirementand disposal. There should be a planned approach to assessing, monitoring and managing thedata and the risks to those data in a manner commensurate with potential impact on patientsafety, product quality and/or the reliability of the decisions made throughout all phases of thedata life cycle.disaster recovery. It is a documented process or set of procedures to recover and protecta business information technology infrastructure in the event of a disaster. It appropriatelydefines resources and actions to be taken before, during and after a disaster.functional specifications. The functional specifications document, if created, definesfunctions and technological solutions that are specified for the computerized system based upontechnical requirements needed to satisfy user requirements (e.g. specified bandwidth required tomeet the user requirement for anticipated system usage).legacy system. It refers to outdated computer system, programming language, applicationsoftware, or process that are used instead of available upgraded versions and are deemed not tofully satisfy current good manufacturing practices requirements.master data. It is a single source of business data used across multiple systems,applications, and processes and subject to change control to ensure accuracy through the data lifecycle.

Working document QAS/16.667/Rev.1page 2363364365366367368369metadata. Metadata are data about data that provide the contextual information requiredto understand those data. These include structural and descriptive metadata. Such data describethe structure, data elements, interrelationships and other characteristics of data. They also permitdata to be attributable to an individual. Metadata necessary to evaluate the meaning of datashould be securely linked to the data and subject to adequate review. For example, in weighing,the number 8 is meaningless without metadata, i.e. the unit, mg. Other examples of metadatainclude the time/date stamp of an activity, the operator identification (ID) of the person whoperformed an activity, the instrument ID used, processing parameters, sequence files, audit trailsand other data required to understand data and reconstruct activities.production environment. For regulated computerized systems, the productionenvironment is the business and computing operating environment in which the computerizedsystem is being used for good manufacturing practices regulated purposes.regression analysis and testing. A documented software verification and validation taskto determine the extent of verification and validation analysis and testing that must be repeatedwhen changes are made to any previously examined software component or system.system life cycle. The period of time that starts when a computerized system is conceivedand ends when the system is retired taking into consideration regulatory requirements. Thesystem life cycle typically includes a requirements and planning phase; a development phase thatincludes: a design phase and a programming and testing phase; a qualification and release phasethat includes: system integration and testing phase; validation phase; release phase; an operationand maintenance phase; and finally a system retirement phase.user acceptance testing. Verification of the fully-configured computerized systeminstalled in the production environment (or in a test environment equivalent to the productionenvironment) to perform as intended in the business process when operated by end-users trainedin end-user standard operating procedures that define system use and control. User-acceptancetesting may be a component of the performance qualification (PQ) or a validation step separatefrom the PQ.user requirements specification. The user requirements specification, if prepared as aseparate document, is a formal document that defines the requirements for use of thecomputerized system in its intended production environment.4.COMPUTERIZED SYSTEM VALIDATION PROTOCOLS AND REPORTS4.1A computerized system needs to be validated according to an approved protocol and final

Working document QAS/16.667/Rev.1page 2403404405406407408409report including results and conclusions prior to routine use.Validation protocol4.2Validation should be executed in accordance with the validation protocol and applicablewritten procedures.4.3 A validation protocol should define the objectives, the validation strategy, includingroles and responsibilities and documentation and activities to be performed. The protocol shouldat least cover the scope, risk management approach, the specification, testing, review and releaseof the computerized system for GMP use.4.4The validation protocol should be tailored to the system type, impact, risks andrequirements applicable to the system for which it governs validation activities.Validation report4.5A validation report should be prepared, summarizing system validation activities.4.6It should make reference to the protocol and outline the validation process, and includean evaluation and conclusion on results. Deviations from the validation protocol and applicablewritten procedures should be described, investigated, assessed and justification for theiracceptance or rejection should be documented.4.7Results should be recorded, reviewed, analyzed and compared against the predeterminedacceptance criteria. All critical and major test discrepancies that occurred during theverification/validation testing, should be investigated and if accepted they should beappropriately justified.4.8 The conclusion of the report should state whether or not the outcome of the validation wasconsidered successful and should make recommendations for future monitoring whereapplicable. The report should be approved after appropriately addressing any issue identifiedduring validation and the system should then be released for GMP use.5.VENDOR MANAGEMENT5.1When third parties (e.g. vendors, service providers) are used, e.g. to provide, install,configure, validate, maintain, modify or retain a computerized system or related service or fordata processing or system components, including cloud-based systems, an evaluation of thevendor-supplied system or service and the vendor’s quality systems should be conducted and

Working document QAS/16.667/Rev.1page 2443444445446recorded. The scope and depth of this evaluation should be based upon risk managementprinciples.5.2The competence and reliability of a vendor are key factors when selecting a productand/or service provider and vendor management is an on-going process that requires periodicassessment and review. Vendor evaluation activities may include but are not limited to:completion of a quality related questionnaire by the vendor; gathering of vendor documentationrelated to system development, testing and maintenance including vendor procedures,specifications, system architecture diagrams, test evidence, release notes and other relevantvendor documentation; an on-site audit of the vendor’s facilities should be conducted to evaluatethe vendor’s system life-cycle control procedures, practices and documentation.5.3A contract should be in place between the manufacturer and the vendor and/or theservice provider defining the roles and responsibilities and quality procedures for both parties,throughout the system life cycle. The contract acceptor should not pass to a third party any ofthe work entrusted to her/him under the contract without the manufacturer’s prior evaluation andapproval of the arrangements.5.REQUIREMENTS SPECIFICATIONS6.1Requirements specifications should be written to document user requirements andfunctional or operational requirements and performance requirements. Requirements may bedocumented in separate user requirements specifications (URS) and functional requirementsspecifications (FRS) documents or in a combined document.User requirements specifications6.2The authorized URS document, or equivalent, should describe the intended uses of theproposed computerized system and should define critical data and data life-cycle controls that willassure consistent and reliable data throughout the processes by which data is created, processed,transmitted, reviewed, reported, retained and retrieved and eventually disposed.6.3The URS should be written in a way to ensure that the data will meet regulatory requirementssuch as the WHO Guidance on good data and record management practices (5).6.4Other aspects that should be specified include, but are not limited to, those related to:447448 449 the data to be entered, processed, reported, stored and retrieved by the system, includingany master data and other data considered to be the most critical to system control and data output;the flow of data including that of the business process(es) in which the system will be

Working document QAS/16.667/Rev.1page 13450451452453 454455456457458459460461 462463464465 466467468469 470 471472473474475476 477 478479480481 482483 484 4854864874886.5used as well as the physical transfer of the data from the system to other systems ornetwork components. Documentation of data flows and data process maps arerecommended to facilitate the assessment and mitigation and control of data integrityrisks across the actual, intended data process(es);networks and operating system environments that support the data flows;how the system interfaces with other systems;the operating program;synchronization and security controls of time/date stamps;controls of both the application software as well as operating systems to assuresystem access only to authorized persons;controls to ensure that data will be attributable to unique individuals (for example, toprohibit use of shared or generic login credentials);controls to ensure that data is legibly and contemporaneously recorded to durable(“permanent”) media at the time of each step and event and controls that enforce thesequencing of each step and event (for example, controls that prevent alteration ofdata in temporary memory in a manner that would not be documented);controls that assure that all steps that create, modify or delete electronic data will berecorded in independent, computer-generated audit trails or other metadata oralternate documents that record the “what” (e.g. original entry), “who” (e.g. useridentification), “when” (e.g. time/date stamp) and “why” (e.g. reason) of the action;backups and the ability to restore the system and data from backups;the ability to archive and retrieve the electronic data in a manner that assures that thearchive copy preserves the full content of the original electronic data set, includingall metadata needed to fully reconstruct the GMP activity. The archive copy shouldalso preserve the meaning of the original electronic data set;input/output checks, including implementation of procedures for the review oforiginal electronic data and metadata, such as audit trails;controls for electronic signatures;alarms and flags that indicate alarm conditions and invalid and altered data in orderto facilitate detection and review of these events;system documentation, includin

Validation of computerized systems,136 is the Appendix 5 of the overarching guidances on 137 validation. 138 139 The following is an overview of the appendices that are intended to complement the general text 140 on validation: 141 142 Appendix 1 143 Valida

Related Documents:

Issue of orders 69 : Publication of misleading information 69 : Attending Committees, etc. 69 : Responsibility 69-71 : APPENDICES : Appendix I : 72-74 Appendix II : 75 Appendix III : 76 Appendix IV-A : 77-78 Appendix IV-B : 79 Appendix VI : 79-80 Appendix VII : 80 Appendix VIII-A : 80-81 Appendix VIII-B : 81-82 Appendix IX : 82-83 Appendix X .

Appendix G Children's Response Log 45 Appendix H Teacher's Journal 46 Appendix I Thought Tree 47 Appendix J Venn Diagram 48 Appendix K Mind Map 49. Appendix L WEB. 50. Appendix M Time Line. 51. Appendix N KWL. 52. Appendix 0 Life Cycle. 53. Appendix P Parent Social Studies Survey (Form B) 54

Cleaning validation Process validation Analytical method validation Computer system validation Similarly, the activity of qualifying systems and . Keywords: Process validation, validation protocol, pharmaceutical process control. Nitish Maini*, Saroj Jain, Satish ABSTRACTABSTRACT Sardana Hindu College of Pharmacy, J. Adv. Pharm. Edu. & Res.

EU GMP Guide-Annex 15 Qualification & Validation draft released In February 2014, a draft of the revised Annex 15 was released by the European Commission (EC) for public comment. The draft version is based on an EMA Concept Paper, published in November 2012 which outlined various reasons for the revision of Annex 15.File Size: 553KBPage Count: 17Explore furtherEU GMP Annex 15: Qualification and Validation - ECA Acad www.gmp-compliance.orgEU GMP Annex 15 Revisions: Improving Qualification and .www.cleanroomtechnology.c GUIDELINES ON VALIDATION APPENDIX 6 VALIDATION O www.who.intGuideline on Process Validationwww.ema.europa.euEudraLex - Volume 4 - Good Manufacturing Practice (GMP .ec.europa.euRecommended to you b

Validation guidelines 1. ICH Q2A Text on validation of analytical procedures: Definitions and terminology (March 1995) 2. ICH Q2B Validation of analytical procedures: Methodology (June 1997) 3. FDA (Draft) Guidance for Industry: Analytical procedures and methods validation 4. Pharmacopoeias USP and European Pharmacopoeia Guidelines

Dipl.-Ing. Becker EN ISO 13849-1 validation EN ISO 13849-2: Validation START Design consideration validation-plan validation-principles documents criteria for fault exclusions faults-lists testing is the testing complete? Validation record end 05/28/13 Seite 4 Analysis category 2,3,4 all

Validation of standardized methods (ISO 17468) described the rules for validation or re-validation of standardized (ISO or CEN) methods. Based on principles described in ISO 16140-2. -Single lab validation . describes the validation against a reference method or without a reference method using a classical approach or a factorial design approach.

Changes in Oracle Providers for ASP.NET in ODAC 12c Release 4 xiv Changes in Oracle Providers for ASP.NET Release 11.2.0.2 xiv Changes in Oracle Providers for ASP.NET Release 11.2.0.1.2 xv 1 Introduction to Oracle Providers for ASP.NET 1.4 Connecting to Oracle Database Cloud Service 1-1 1.1 Overview of Oracle Providers for ASP.NET 1-1 1.2 Oracle Providers for ASP.NET Assembly 1-4 1.3 System .