<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: James Whitfield</title>
    <description>The latest articles on Forem by James Whitfield (@jwithfield_qa).</description>
    <link>https://forem.com/jwithfield_qa</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3882280%2F4687ca7d-bcbc-4e7c-be94-462c168637ff.png</url>
      <title>Forem: James Whitfield</title>
      <link>https://forem.com/jwithfield_qa</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/jwithfield_qa"/>
    <language>en</language>
    <item>
      <title>510(k) clearance pitfalls — the weak links that actually stall approval</title>
      <dc:creator>James Whitfield</dc:creator>
      <pubDate>Fri, 22 May 2026 02:46:03 +0000</pubDate>
      <link>https://forem.com/jwithfield_qa/510k-clearance-pitfalls-the-weak-links-that-actually-stall-approval-5a3a</link>
      <guid>https://forem.com/jwithfield_qa/510k-clearance-pitfalls-the-weak-links-that-actually-stall-approval-5a3a</guid>
      <description>&lt;p&gt;I’ve shepherded several Class II devices through the 510(k) gauntlet and reviewed enough reviewer comments to notice a pattern: approvals rarely fail because a device “doesn’t work.” They stall because the submission doesn’t tell a clear, evidence-backed story. Below are the weak links I keep seeing — concrete, fixable problems that turn reviewer questions into hold letters and extra testing cycles.&lt;/p&gt;

&lt;h2&gt;
  
  
  The core problem: a disconnected story
&lt;/h2&gt;

&lt;p&gt;FDA reviewers are looking to connect three things: intended use/indications, design and risk controls, and objective evidence (bench, software, biocompatibility, human factors, clinical when needed). When those links are missing, reviewers raise issues.&lt;/p&gt;

&lt;p&gt;Common symptom list:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Vague intended use or inconsistent labeling across documents.&lt;/li&gt;
&lt;li&gt;Tests that don’t directly map to the claims you make.&lt;/li&gt;
&lt;li&gt;Risk controls that are documented in the DHF but not verified in the V&amp;amp;V package.&lt;/li&gt;
&lt;li&gt;Software build artifacts without a reproducible trace to validated test runs.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If your submission forces the reviewer to “fill in the blanks,” expect delays.&lt;/p&gt;

&lt;h2&gt;
  
  
  Frequent weak links that cause holds
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Intended use &amp;amp; predicate mismatch&lt;/li&gt;
&lt;li&gt;Problem: The intended use or technological characteristics you list don’t match the predicate you cite, or you try to mix predicates in ways that obscure equivalence.&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Tip: Be explicit about the predicate you chose and why the differences don’t raise new questions of safety/effectiveness. If differences exist, describe mitigations and supporting evidence.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Poorly scoped verification/validation&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Problem: Tests exist, but pass/fail criteria, acceptance rationale, or linkage to user needs/requirements are unclear.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Tip: Use a requirements-to-test trace matrix. For software, include the exact build used for V&amp;amp;V and reproduce test logs. If you run automated unit/CI tests, export artifacts that show timestamps, pass/fail, and environment.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Incomplete risk management&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Problem: ISO 14971-style hazards are listed, but risk controls aren’t implemented or their effectiveness isn’t verified.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Tip: Show the chain — hazard → risk control → verification test → residual risk acceptance. Don’t leave reviewer guessing whether a control was actually validated.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Human factors/usability gaps&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Problem: You submit a human factors protocol but no summative validation for critical tasks, or you use formative data to claim user safety.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Tip: Follow IEC 62366 guidance: identify critical tasks, run summative testing in realistic environments, and include failure modes observed and mitigations.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Biocompatibility and materials questions&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Problem: Materials declared “biocompatible” but unsupported by ISO 10993 testing or unsuitable extraction methods.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Tip: Match the device’s patient-contact type and duration to the correct ISO 10993 tests and include rationale for any deviations.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Software lifecycle &amp;amp; cybersecurity missing pieces&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Problem: Software submissions without a clear IEC 62304 mapped lifecycle, traceability from requirements to code to tests, or without basic cybersecurity risk analysis.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Tip: Provide software architecture, hazard analysis, build artifacts, and cybersecurity risk control verification. If you use libraries or third-party components, list versions and SBOM-like details.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Sterilization and packaging documentation&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Problem: Sterility assurance level and packaging integrity tests aren’t tied to ISO 11607 or lack worst-case rationale.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Tip: Provide method, cycle data, validation rationale, and worst-case package testing results.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Supplier control &amp;amp; manufacturing readiness&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Problem: The QMS indicates design control work is done, but suppliers for critical components lack approval evidence or incoming inspection criteria.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Tip: Include supplier qualification files for critical parts, change-notice procedures, and how production verification maps back to the device spec.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Practical steps I use to close the gaps
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Build a submission checklist from the reviewer’s perspective. Walk through the 510(k) as if you’re verifying their ability to answer “how does this make the device safe and effective?”&lt;/li&gt;
&lt;li&gt;Maintain a live traceability matrix (requirements → design outputs → risk controls → verification/validation). Export snapshots as part of the submission.&lt;/li&gt;
&lt;li&gt;Version-control your V&amp;amp;V artifacts. For software, include reproducible builds and CI logs. For bench tests, include raw data, protocols, and acceptance criteria in one package.&lt;/li&gt;
&lt;li&gt;Run an internal “red-team” review: a QA person unfamiliar with the project reviews the submission for missing links.&lt;/li&gt;
&lt;li&gt;Use pre-sub meetings selectively. Bring a focused list of questions (e.g., acceptance of a nonclinical test plan) and capture FDA feedback to reduce subjective reviewer requests later.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What I automate
&lt;/h2&gt;

&lt;p&gt;I automate three things that save time during review:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Traceability exports (requirements-to-test) from our QMS so every submission has a single-source-of-truth snapshot.&lt;/li&gt;
&lt;li&gt;Packaging of V&amp;amp;V PDFs with a deterministic filename structure so reviewers can find matching protocol/results quickly.&lt;/li&gt;
&lt;li&gt;Software SBOM and build artifact generation from CI — this avoids “which build was tested?” questions.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Final thought
&lt;/h2&gt;

&lt;p&gt;Most 510(k) stalls are avoidable if the submission reads like a connected argument: this is the claim, this is why we’re confident, and here is the evidence that proves it. Fix the weak links before you submit and you’ll skip rounds of extra testing and clarification.&lt;/p&gt;

&lt;p&gt;What’s the single documentation gap that has bitten you most during a 510(k) — and how did you fix it?&lt;/p&gt;

</description>
      <category>qms</category>
      <category>medtech</category>
      <category>regulatory</category>
      <category>compliance</category>
    </item>
    <item>
      <title>Why our eQMS ran in parallel for 18 months — and what I’d do differently</title>
      <dc:creator>James Whitfield</dc:creator>
      <pubDate>Tue, 19 May 2026 22:20:22 +0000</pubDate>
      <link>https://forem.com/jwithfield_qa/why-our-eqms-ran-in-parallel-for-18-months-and-what-id-do-differently-4lg9</link>
      <guid>https://forem.com/jwithfield_qa/why-our-eqms-ran-in-parallel-for-18-months-and-what-id-do-differently-4lg9</guid>
      <description>&lt;p&gt;I’ve been responsible for maintaining a Class II product’s QMS during one of the messiest migrations I’ve seen: an 18‑month parallel run where the old eQMS and the new one lived side-by-side. We survived audits and kept product moving, but we paid for every month with duplicated work, missed automations, and an enormous reconciliation backlog. Writing this down because the pain felt avoidable in places — and maybe my scars will help someone else planning a migration.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why we ended up with 18 months of parallel systems
&lt;/h2&gt;

&lt;p&gt;There isn’t a single reason. It was the slow creep of risk-aversive decisions plus integration and validation realities:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Validation scope kept expanding. The new vendor’s module set changed; our validation plan ballooned to cover integrations, webhooks, and vendor-supplied scripts. Each change meant more IQ/OQ/PQ cycles.&lt;/li&gt;
&lt;li&gt;Integrations took longer than expected. We relied on the new system’s APIs to push non-regulated events (build notifications, CI statuses) and to trigger CAPAs and change controls from our issue tracker. The API endpoints existed but had rate limits, schema mismatches, and edge cases that needed custom middleware.&lt;/li&gt;
&lt;li&gt;Third‑party dependencies. Supplier portals and manufacturing systems couldn’t be changed on our schedule; their timelines forced interim workarounds.&lt;/li&gt;
&lt;li&gt;Audit and regulatory caution. With ISO 13485 and 21 CFR Part 820 on the line, QA leadership refused a big-bang cutover until we could demonstrate traceability, preserved audit trails, and validated CAPA triggering across systems.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Those combined into a practical requirement: keep the old QMS writable until we were absolutely sure nothing would fall through the cracks.&lt;/p&gt;

&lt;h2&gt;
  
  
  The actual day-to-day pain points
&lt;/h2&gt;

&lt;p&gt;If you’ve not lived inside a long parallel period, here’s what to expect:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Duplicate record entry. Engineers entered design changes in two places. Document owners managed revisions twice. That doubles review cycles and increases risk of version drift.&lt;/li&gt;
&lt;li&gt;CAPA and complaint duplication. Without a single source of truth for incoming complaints, both systems spawned CAPAs for the same root cause.&lt;/li&gt;
&lt;li&gt;Traceability gaps. Links between design inputs, risk assessments, verification evidence, and changes were split across systems. Auditors ask for “single-thread” traceability; you’ll spend days stitching it.&lt;/li&gt;
&lt;li&gt;Training chaos. Two sets of SOPs, two UAT environments, and users who default to the path of least resistance (usually the old system).&lt;/li&gt;
&lt;li&gt;Reconciliation backlog. The migration export wasn’t 1:1; mapping statuses, approver signatures, and revision histories required manual reconciliation and exception handling.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Practical fixes that actually helped us
&lt;/h2&gt;

&lt;p&gt;We learned some mitigation patterns that reduced the bleeding — none were magic, but together they made cutover possible.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Freeze non-critical config changes in both systems during reconciliation windows. Treat migration as a controlled change: document it, justify the freeze, and enforce it.&lt;/li&gt;
&lt;li&gt;Define canonical record owners. For a period, pick one system per record type as the “source of truth” (e.g., complaints and CAPAs in old QMS; engineering changes in new QMS) and enforce through SOPs.&lt;/li&gt;
&lt;li&gt;Automate reconciliation reports daily. Build scripts that pull key fields from both systems (ID, status, assignee, timestamps). Reconcile programmatically and surface exceptions to human reviewers.&lt;/li&gt;
&lt;li&gt;Export with metadata, not just PDFs. When you export controlled docs, capture approval history, signatures, and change logs in a machine-readable sidecar (JSON or CSV). If your vendor only gives PDFs, script a metadata layer and link it to PDFs.&lt;/li&gt;
&lt;li&gt;Keep a read-only archive of the legacy system right after cutover. You need it for late-discovered audit trails; don’t delete or decommission the system until regulators and your RA/QA team sign off.&lt;/li&gt;
&lt;li&gt;Validate integrations early with smoke tests. Create a CI pipeline (GitHub Actions or your preferred runner) that runs end-to-end smoke tests against sandbox APIs whenever vendor updates occur.&lt;/li&gt;
&lt;li&gt;Keep CAPA triggering deterministic. If you use webhooks to create CAPAs from an issue tracker, add idempotency keys and an external reconciliation table so duplicates aren’t created when retries happen.&lt;/li&gt;
&lt;li&gt;Train in waves and force a UAT window where “real” events are exercised in the new system, including CAPA, change control, and complaint handling. Everything looks fine until someone files a complaint in production; those are the scenarios auditors love.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Things I’d change if I had the project to run again
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Scope integrations as part of the minimum viable QMS. If CAPA and change control can’t be reliably integrated, don’t assume you can migrate those modules early.&lt;/li&gt;
&lt;li&gt;Budget more for middleware. Off-the-shelf API adapters rarely map perfectly to your status models and audit-track needs. A small integration layer saved us weeks.&lt;/li&gt;
&lt;li&gt;Start migration validation earlier and in parallel with vendor configuration. We waited for completed configs; instead, work validation scripts against partial deployments.&lt;/li&gt;
&lt;li&gt;Define the cutover decision criteria up front — not whimsically, but measurable gates: reconciliation rate under X exceptions/day, all smoke tests green for Y days, and signoffs from QA/RA/business owners.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  A reality check: document-management-only systems are not a QMS
&lt;/h2&gt;

&lt;p&gt;One lesson that bit teams repeatedly: a system that manages documents but lacks native workflows for CAPA, change control, and traceability is a document-management system — not an eQMS. If your new vendor lacks connected workflows or controlled automation for CAPAs, you’ll keep the old QMS just for those features.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final thought
&lt;/h2&gt;

&lt;p&gt;Long parallel runs are sometimes unavoidable, but they don’t have to become a permanent tax on productivity. Decide the minimum canonical sources, automate reconciliation, and treat the migration itself as a controlled, validated process with its own SOPs and acceptance criteria.&lt;/p&gt;

&lt;p&gt;How long did your last eQMS parallel run last, and what single mitigation saved you the most pain?&lt;/p&gt;

</description>
      <category>qms</category>
      <category>medtech</category>
      <category>compliance</category>
    </item>
    <item>
      <title>Why our eQMS ran in parallel for 18 months — and what I’d do differently</title>
      <dc:creator>James Whitfield</dc:creator>
      <pubDate>Tue, 19 May 2026 21:17:33 +0000</pubDate>
      <link>https://forem.com/jwithfield_qa/why-our-eqms-ran-in-parallel-for-18-months-and-what-id-do-differently-4p4j</link>
      <guid>https://forem.com/jwithfield_qa/why-our-eqms-ran-in-parallel-for-18-months-and-what-id-do-differently-4p4j</guid>
      <description>&lt;p&gt;I’ve been responsible for maintaining a Class II product’s QMS during one of the messiest migrations I’ve seen: an 18‑month parallel run where the old eQMS and the new one lived side-by-side. We survived audits and kept product moving, but we paid for every month with duplicated work, missed automations, and an enormous reconciliation backlog. Writing this down because the pain felt avoidable in places — and maybe my scars will help someone else planning a migration.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why we ended up with 18 months of parallel systems
&lt;/h2&gt;

&lt;p&gt;There isn’t a single reason. It was the slow creep of risk-aversive decisions plus integration and validation realities:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Validation scope kept expanding. The new vendor’s module set changed; our validation plan ballooned to cover integrations, webhooks, and vendor-supplied scripts. Each change meant more IQ/OQ/PQ cycles.&lt;/li&gt;
&lt;li&gt;Integrations took longer than expected. We relied on the new system’s APIs to push non-regulated events (build notifications, CI statuses) and to trigger CAPAs and change controls from our issue tracker. The API endpoints existed but had rate limits, schema mismatches, and edge cases that needed custom middleware.&lt;/li&gt;
&lt;li&gt;Third‑party dependencies. Supplier portals and manufacturing systems couldn’t be changed on our schedule; their timelines forced interim workarounds.&lt;/li&gt;
&lt;li&gt;Audit and regulatory caution. With ISO 13485 and 21 CFR Part 820 on the line, QA leadership refused a big-bang cutover until we could demonstrate traceability, preserved audit trails, and validated CAPA triggering across systems.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Those combined into a practical requirement: keep the old QMS writable until we were absolutely sure nothing would fall through the cracks.&lt;/p&gt;

&lt;h2&gt;
  
  
  The actual day-to-day pain points
&lt;/h2&gt;

&lt;p&gt;If you’ve not lived inside a long parallel period, here’s what to expect:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Duplicate record entry. Engineers entered design changes in two places. Document owners managed revisions twice. That doubles review cycles and increases risk of version drift.&lt;/li&gt;
&lt;li&gt;CAPA and complaint duplication. Without a single source of truth for incoming complaints, both systems spawned CAPAs for the same root cause.&lt;/li&gt;
&lt;li&gt;Traceability gaps. Links between design inputs, risk assessments, verification evidence, and changes were split across systems. Auditors ask for “single-thread” traceability; you’ll spend days stitching it.&lt;/li&gt;
&lt;li&gt;Training chaos. Two sets of SOPs, two UAT environments, and users who default to the path of least resistance (usually the old system).&lt;/li&gt;
&lt;li&gt;Reconciliation backlog. The migration export wasn’t 1:1; mapping statuses, approver signatures, and revision histories required manual reconciliation and exception handling.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Practical fixes that actually helped us
&lt;/h2&gt;

&lt;p&gt;We learned some mitigation patterns that reduced the bleeding — none were magic, but together they made cutover possible.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Freeze non-critical config changes in both systems during reconciliation windows. Treat migration as a controlled change: document it, justify the freeze, and enforce it.&lt;/li&gt;
&lt;li&gt;Define canonical record owners. For a period, pick one system per record type as the “source of truth” (e.g., complaints and CAPAs in old QMS; engineering changes in new QMS) and enforce through SOPs.&lt;/li&gt;
&lt;li&gt;Automate reconciliation reports daily. Build scripts that pull key fields from both systems (ID, status, assignee, timestamps). Reconcile programmatically and surface exceptions to human reviewers.&lt;/li&gt;
&lt;li&gt;Export with metadata, not just PDFs. When you export controlled docs, capture approval history, signatures, and change logs in a machine-readable sidecar (JSON or CSV). If your vendor only gives PDFs, script a metadata layer and link it to PDFs.&lt;/li&gt;
&lt;li&gt;Keep a read-only archive of the legacy system right after cutover. You need it for late-discovered audit trails; don’t delete or decommission the system until regulators and your RA/QA team sign off.&lt;/li&gt;
&lt;li&gt;Validate integrations early with smoke tests. Create a CI pipeline (GitHub Actions or your preferred runner) that runs end-to-end smoke tests against sandbox APIs whenever vendor updates occur.&lt;/li&gt;
&lt;li&gt;Keep CAPA triggering deterministic. If you use webhooks to create CAPAs from an issue tracker, add idempotency keys and an external reconciliation table so duplicates aren’t created when retries happen.&lt;/li&gt;
&lt;li&gt;Train in waves and force a UAT window where “real” events are exercised in the new system, including CAPA, change control, and complaint handling. Everything looks fine until someone files a complaint in production; those are the scenarios auditors love.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Things I’d change if I had the project to run again
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Scope integrations as part of the minimum viable QMS. If CAPA and change control can’t be reliably integrated, don’t assume you can migrate those modules early.&lt;/li&gt;
&lt;li&gt;Budget more for middleware. Off-the-shelf API adapters rarely map perfectly to your status models and audit-track needs. A small integration layer saved us weeks.&lt;/li&gt;
&lt;li&gt;Start migration validation earlier and in parallel with vendor configuration. We waited for completed configs; instead, work validation scripts against partial deployments.&lt;/li&gt;
&lt;li&gt;Define the cutover decision criteria up front — not whimsically, but measurable gates: reconciliation rate under X exceptions/day, all smoke tests green for Y days, and signoffs from QA/RA/business owners.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  A reality check: document-management-only systems are not a QMS
&lt;/h2&gt;

&lt;p&gt;One lesson that bit teams repeatedly: a system that manages documents but lacks native workflows for CAPA, change control, and traceability is a document-management system — not an eQMS. If your new vendor lacks connected workflows or controlled automation for CAPAs, you’ll keep the old QMS just for those features.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final thought
&lt;/h2&gt;

&lt;p&gt;Long parallel runs are sometimes unavoidable, but they don’t have to become a permanent tax on productivity. Decide the minimum canonical sources, automate reconciliation, and treat the migration itself as a controlled, validated process with its own SOPs and acceptance criteria.&lt;/p&gt;

&lt;p&gt;How long did your last eQMS parallel run last, and what single mitigation saved you the most pain?&lt;/p&gt;

</description>
      <category>qms</category>
      <category>medtech</category>
      <category>compliance</category>
    </item>
    <item>
      <title>CE under MDR — what's actually new (and what teams still get wrong)</title>
      <dc:creator>James Whitfield</dc:creator>
      <pubDate>Wed, 13 May 2026 02:03:50 +0000</pubDate>
      <link>https://forem.com/jwithfield_qa/ce-under-mdr-whats-actually-new-and-what-teams-still-get-wrong-3ho8</link>
      <guid>https://forem.com/jwithfield_qa/ce-under-mdr-whats-actually-new-and-what-teams-still-get-wrong-3ho8</guid>
      <description>&lt;p&gt;I’ve been through enough MDR audits and remediations to see the same misunderstandings show up across teams. People treat CE marking like a rubber stamp process that changed slightly in 2017 — but MDR is a rework of the whole safety and evidence model. Below are the differences I actually had to live through with my engineering and RA colleagues, plus pragmatic steps that helped us survive tighter review by notified bodies.&lt;/p&gt;

&lt;h2&gt;
  
  
  The headline differences that matter in practice
&lt;/h2&gt;

&lt;p&gt;These aren’t legal theory — they’re the items that caused audit findings in my work:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Stronger clinical evidence expectations. Clinical evaluation and post-market clinical follow-up (PMCF) need to be proportional, continuous, and demonstrable. The “literature-only” approach for borderline devices seldom stands up anymore.&lt;/li&gt;
&lt;li&gt;More rigorous post-market surveillance (PMS). It’s not a paper plan: you must feed PMS into risk management, trigger CAPAs, and produce periodic outputs (PSUR-type reporting) for higher-risk devices.&lt;/li&gt;
&lt;li&gt;Person Responsible for Regulatory Compliance (PRRC). This is an explicit role with documented qualifications and defined responsibilities — your org needs someone accountable, not just an external consultant on retainer.&lt;/li&gt;
&lt;li&gt;UDI and traceability. Unique Device Identification is real work: labelling, UDI-DI relationships, and linking to technical documentation and vigilance entries.&lt;/li&gt;
&lt;li&gt;Notified bodies changed scope and scrutiny. They want deeper technical documentation, more robust clinical justifications, and evidence that your QMS enforces MDR-specific processes.&lt;/li&gt;
&lt;li&gt;Economic operators clarified. Authorized representatives, importers, and distributors now have explicit obligations — contracts and agreements must reflect those.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you’re still treating CE as “same as MDD,” you’ll hit findings where it counts: clinical files, PMS outputs, and the traceability between risk, performance, and post-market data.&lt;/p&gt;

&lt;h2&gt;
  
  
  Where teams typically get it wrong
&lt;/h2&gt;

&lt;p&gt;From my audits and remediation projects, the recurring missteps are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Treating clinical evaluation as a one-off dossier. Wrong rhythm. It’s a lifecycle activity; literature review, clinical data, and PMCF loop back to risk.&lt;/li&gt;
&lt;li&gt;Keeping PMS as a passive archive. PMS must generate signals and action. If it sits in a folder and only gets updated for audits, you’ll fail to demonstrate proactive risk control.&lt;/li&gt;
&lt;li&gt;Underestimating labeling and UDI complexity. Label design, barcode generation, and UDI administration across SKUs and kits were more painful than anyone expected.&lt;/li&gt;
&lt;li&gt;Ambiguous PRRC responsibilities. Listing a title on org chart isn’t enough — the PRRC must have documented tasks and evidence they actually participate in conformity assessment.&lt;/li&gt;
&lt;li&gt;Not mapping supplier obligations. Suppliers are now upstream sources of regulatory data; supplier agreements and incoming controls must reflect MDR expectations.&lt;/li&gt;
&lt;li&gt;Assuming the Notified Body will “fill the gaps.” Notified bodies assess; they won’t remediate your QMS. Expect them to flag problems earlier and more sharply than under MDD.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Practical fixes that worked for us
&lt;/h2&gt;

&lt;p&gt;If you need to triage effort because audit is months away, focus on these high-value items first:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Clinical strategy and gap list&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Do a rapid clinical evaluation gap assessment: what sources of data do you actually have vs what the MDR expects?&lt;/li&gt;
&lt;li&gt;Prioritize ongoing PMCF activities that can be initiated quickly (registries, targeted follow-up calls).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;PMS → CAPA → Risk linkage&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Turn PMS outputs into documented inputs to risk management. If trends are detected, show the CAPA and risk-file link.&lt;/li&gt;
&lt;li&gt;Instrument one traceable example end-to-end (complaint → investigation → CAPA → design change → verification).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;PRRC evidence pack&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Create a short packet that documents the PRRC’s qualifications, appointment letter, role description, and meeting minutes showing involvement in conformity decisions.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;UDI pilot&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Pick a pilot SKU and implement UDI on label, packing, and in your internal ERP. Document procedures for generation and assignment of basic UDI-DI.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Notified Body readiness&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Update your technical documentation table of contents to mirror MDR Annex structure. Even a mapped index will speed NB review and reduce nonconformities.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Supplier contracts and evidence&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ensure supplier technical files and declarations are accessible. Add incoming inspection checks for regulatory-relevant attributes.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Tools and automation pointers (real-world focus)
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Use your QMS to link records. The audit will want traceability from an adverse event through investigation to technical documentation updates — avoid siloed folders.&lt;/li&gt;
&lt;li&gt;Automate routine PMS data pulls where possible (sales, complaint rates, field performance) so you can show trend analysis instead of manual spreadsheets.&lt;/li&gt;
&lt;li&gt;Template clinical evaluation reports and PMCF protocols saved engineering time; they’re not a substitute for evidence but speed documentation.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I’m intentionally not pitching products here — pick tools that can maintain traceable connections between documents, risk files, clinical evidence, and CAPAs.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final practical reminder
&lt;/h2&gt;

&lt;p&gt;CE under MDR is still a manufacturer’s declaration of conformity, but the bar for the evidence and the systems that produce it is higher. For teams used to MDD-era checklists, the work isn’t just more documents — it’s redesigning how clinical data, risk management, and post-market intelligence talk to each other day-to-day.&lt;/p&gt;

&lt;p&gt;What’s one concrete change your team made to link PMS outputs to design verification or CAPA — and did it survive your next audit?&lt;/p&gt;

</description>
      <category>qms</category>
      <category>medtech</category>
      <category>regulatory</category>
    </item>
    <item>
      <title>Predetermined change-control plans for AI/ML SaMD — how to make them audit-proof</title>
      <dc:creator>James Whitfield</dc:creator>
      <pubDate>Wed, 06 May 2026 20:05:38 +0000</pubDate>
      <link>https://forem.com/jwithfield_qa/predetermined-change-control-plans-for-aiml-samd-how-to-make-them-audit-proof-hmm</link>
      <guid>https://forem.com/jwithfield_qa/predetermined-change-control-plans-for-aiml-samd-how-to-make-them-audit-proof-hmm</guid>
      <description>&lt;p&gt;I’ve spent the last three years defending algorithm updates to notified bodies and answering the same auditor question: “Show me how you control changes to this model.” For Class II software-as-a-medical-device (SaMD) where models will keep evolving, a predetermined change-control plan (PCCP) isn’t optional — it’s the practical way to show auditors you treated change control as governance, not theater.&lt;/p&gt;

&lt;p&gt;Below are the concrete patterns we used to build PCCPs and validation artifacts that survive ISO 13485/21 CFR inspections and real-world use. I’ll note where things are specific to a Class II workflow, and where the approach scales up to higher-risk devices.&lt;/p&gt;

&lt;h2&gt;
  
  
  What a PCCP actually needs to prove
&lt;/h2&gt;

&lt;p&gt;Regulators are not asking you to stop improving models. They want evidence that:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;You pre-specified what kinds of changes are allowed without a full redesign review.&lt;/li&gt;
&lt;li&gt;You defined objective acceptance criteria and test artifacts for each change type.&lt;/li&gt;
&lt;li&gt;You have a controlled, traceable pipeline for making, testing, and deploying changes.&lt;/li&gt;
&lt;li&gt;You monitor model performance in the field and have CAPA triggers tied to that monitoring.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Link these to the standards auditors will quote: ISO 13485 (change control expectations — see section on change processes) and FDA 21 CFR 820.70 (design changes). If you can map your PCCP artifacts to those clauses, you’re speaking the auditor’s language.&lt;/p&gt;

&lt;h2&gt;
  
  
  A practical PCCP structure (the pieces we deliver)
&lt;/h2&gt;

&lt;p&gt;Treat the PCCP like a small design control bundle. Ours includes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Scope and change taxonomy

&lt;ul&gt;
&lt;li&gt;What component(s) the PCCP covers (weights, retraining pipeline, pre/post-processing).&lt;/li&gt;
&lt;li&gt;Change categories: A (parameters/configs), B (retraining on new labeled data), C (architecture changes).&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Preconditions / guarded inputs

&lt;ul&gt;
&lt;li&gt;Data provenance checks, labeling consistency rules, and minimum sample-size rules.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Acceptance criteria (numeric + clinical context)

&lt;ul&gt;
&lt;li&gt;Performance metrics (AUC, sensitivity at fixed specificity, calibration) with pass/fail thresholds.&lt;/li&gt;
&lt;li&gt;Clinical-impact checks: false-negative reduction target, no clinically meaningful increase in false-positives.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Validation artifacts to produce

&lt;ul&gt;
&lt;li&gt;Fixed validation dataset (frozen holdout), independent test set, synthetic stress tests.&lt;/li&gt;
&lt;li&gt;Reproducible training logs, seed control, container image ID.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Deployment controls

&lt;ul&gt;
&lt;li&gt;Canary/rollout plan, rollout percent, rollback criteria.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Monitoring &amp;amp; post-market checks

&lt;ul&gt;
&lt;li&gt;Drift detection rules, periodic re-eval cadence, real-world performance thresholds.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Governance &amp;amp; traceability

&lt;ul&gt;
&lt;li&gt;Required approvals, CAPA triggers, trace matrix linking risk controls to requirements.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;
  
  
  How we make validation reproducible
&lt;/h2&gt;

&lt;p&gt;Auditors will ask to re-run your validation or at least to see that it could be re-run. That means reproducible environments and frozen datasets:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Keep a "golden" holdout test set that never touches retraining. If you need to expand it, document why and treat it as a design change.&lt;/li&gt;
&lt;li&gt;Store container images and a deterministic training script (hash the repo/commit + container ID).&lt;/li&gt;
&lt;li&gt;Capture random seeds, preprocessing versions, and third-party library versions (don’t rely on "latest").&lt;/li&gt;
&lt;li&gt;Produce a validation report template that includes: dataset stats, metric results with confidence intervals, failure-mode analysis, and clinical-meaning commentary.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We check these programmatically in CI so the document is generated, not manually assembled.&lt;/p&gt;

&lt;h2&gt;
  
  
  Risk-staged changes and when to escalate
&lt;/h2&gt;

&lt;p&gt;Not every model tweak needs a full design-review workflow. Use a clear staging rule:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Category A (minor): hyperparameter tuning, threshold change within pre-specified range.

&lt;ul&gt;
&lt;li&gt;Controls: automated unit tests, automated metric checks against frozen validation set, engineering sign-off + QA review.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Category B (moderate): retraining on new labeled data that meets provenance rules.

&lt;ul&gt;
&lt;li&gt;Controls: full validation report, clinical reviewer sign-off, QA + RA approval, limited rollout.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Category C (major): architecture changes, new input modalities, label schema changes.

&lt;ul&gt;
&lt;li&gt;Controls: design history file update, full risk assessment (per ISO 14971), formal change control board (CCB) review.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;Document the escalation path in the PCCP and automate it wherever possible.&lt;/p&gt;

&lt;h2&gt;
  
  
  Operational tooling that helps (CI, monitoring, QMS integration)
&lt;/h2&gt;

&lt;p&gt;You don’t need exotic tools — you need reliable links between engineering and your QMS:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CI pipelines that run validation and produce an artifact bundle (report, hashes, container IDs).&lt;/li&gt;
&lt;li&gt;Model-monitoring that emits drift and performance alerts as events (webhooks).&lt;/li&gt;
&lt;li&gt;Configured webhooks or API calls that create a change-control record in the QMS when a Category B/C change is proposed.&lt;/li&gt;
&lt;li&gt;Traceability matrix stored with artifact IDs linking to the Design History File (DHF).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;On the tooling side: we run Greenlight Guru for controlled docs and link CI artifacts via a webhook that creates a change record. Whatever QMS you use, ensure it captures the artifact IDs — auditors want the chain of custody.&lt;/p&gt;

&lt;h2&gt;
  
  
  Post-market and CAPA integration
&lt;/h2&gt;

&lt;p&gt;Define explicit CAPA triggers tied to monitoring metrics:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Trigger examples:

&lt;ul&gt;
&lt;li&gt;Population drift metric exceeds threshold for two reporting periods.&lt;/li&gt;
&lt;li&gt;Sensitivity drop below X for consecutive weeks.&lt;/li&gt;
&lt;li&gt;Clinician complaint count related to misclassification crosses threshold.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;When a trigger fires, your PCCP should define:

&lt;ul&gt;
&lt;li&gt;Immediate mitigation (rollback or restrict use).&lt;/li&gt;
&lt;li&gt;Root-cause workflow (data drift vs label noise vs concept shift).&lt;/li&gt;
&lt;li&gt;A timeboxed plan for corrective action and re-validation.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;Make sure CAPA activities link back to the PCCP change record — that traceability is a frequent auditor question.&lt;/p&gt;

&lt;h2&gt;
  
  
  My pragmatic rules that saved time in audits
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Freeze an immutable test set and treat changes to that set as a design change.&lt;/li&gt;
&lt;li&gt;Automate as many checks as possible — a generated validation report beats a hand-assembled one every time.&lt;/li&gt;
&lt;li&gt;Keep acceptance criteria clinical, not just statistical. Auditors like seeing clinical rationale.&lt;/li&gt;
&lt;li&gt;Be explicit about who can approve what. “Engineering OK” is not enough.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Closing (and one question)
&lt;/h2&gt;

&lt;p&gt;A PCCP is as much about the governance steps you pre-agree on as it is about metrics. If you can answer “what would we do if model sensitivity dropped 5% tomorrow?” in a 3-slide packet with reproducible artifacts, inspectors tend to relax.&lt;/p&gt;

&lt;p&gt;How are you tying automated model-monitoring events into your change-control/QMS workflows today — webhooks into a change record, manual ticketing, or something else?&lt;/p&gt;

</description>
      <category>qms</category>
      <category>medtech</category>
      <category>compliance</category>
      <category>regulatory</category>
    </item>
    <item>
      <title>How we built PMS reports that actually survive a notified-body audit</title>
      <dc:creator>James Whitfield</dc:creator>
      <pubDate>Thu, 30 Apr 2026 00:18:15 +0000</pubDate>
      <link>https://forem.com/jwithfield_qa/how-we-built-pms-reports-that-actually-survive-a-notified-body-audit-31la</link>
      <guid>https://forem.com/jwithfield_qa/how-we-built-pms-reports-that-actually-survive-a-notified-body-audit-31la</guid>
      <description>&lt;p&gt;I’ve owned post-market surveillance (PMS) for Class II devices through two notified-body audits. The audits weren’t hostile — they were meticulous. The difference between a report that passes and one that generates two follow-up requests is almost entirely in how you show the decision-making trail: what data you looked at, how you evaluated signals, how risk-management and clinical evaluation fed back into product actions.&lt;/p&gt;

&lt;p&gt;Below are the practical things that helped our PMS reports pass without surprise findings. This is grounded in our Class II setup (ISO 13485 + MDR awareness, working with a mid-size notified body), and YMMV for higher-risk/device types.&lt;/p&gt;

&lt;h2&gt;
  
  
  What notified bodies actually check
&lt;/h2&gt;

&lt;p&gt;From my experience, auditors look for a few consistent things:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Evidence of an active PMS system: documented plan, data sources, frequency, responsibilities.&lt;/li&gt;
&lt;li&gt;Traceability from raw data (complaints, service reports, registries, literature) to findings and decisions.&lt;/li&gt;
&lt;li&gt;Risk-based signal detection and documented rationale for actions (or for no action).&lt;/li&gt;
&lt;li&gt;Links to other QMS processes: complaints, vigilance, CAPA, change control, risk management, clinical evaluation.&lt;/li&gt;
&lt;li&gt;Timeliness: periodic reviews done on schedule and follow-through on identified actions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;They’re not just checking boxes — they want to see the logic. A one-page summary saying “no signals” isn't convincing unless you can show what you looked at and why that’s sufficient.&lt;/p&gt;

&lt;h2&gt;
  
  
  How we prepared PMS reports that made audits easy
&lt;/h2&gt;

&lt;p&gt;We treated each PMS report like a mini-audit trail. Concrete steps we used:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Start with a clear scope and sources&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Define the time window and product variants covered.&lt;/li&gt;
&lt;li&gt;List all sources (complaints DB, service records, distributor feedback, registries, literature searches, social media monitoring if used, complaint samples).&lt;/li&gt;
&lt;li&gt;For each source, document the owner and refresh cadence.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Executive summary + decision log&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;One-page executive summary that states: conclusion, highest risks identified, and actions taken.&lt;/li&gt;
&lt;li&gt;A decision log that records each signal considered, evaluation outcome, and rationale (e.g., “no action because root cause outside device control; monitoring only”).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Signal evaluation methodology&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Spell out how signals are detected (trend thresholds, qualitative triggers).&lt;/li&gt;
&lt;li&gt;Describe any statistical tests or sampling approaches — auditors don’t need to be statisticians, but they need to see that you didn’t eyeball it.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Link to risk management and clinical evaluation&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;For every identified issue, reference the risk-management file and any updates to residual risk, mitigations, or warnings.&lt;/li&gt;
&lt;li&gt;Show how the PMS findings affected the clinical evaluation (and vice versa).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Documented follow-up and verification&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;For actions (CAPA, labeling, supplier change), include closure evidence and outcomes monitoring.&lt;/li&gt;
&lt;li&gt;If you decided not to act, show monitoring steps and review dates.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Keep the report navigable&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Use a table-of-contents, hyperlinks to evidence, and a simple traceability map: Data source → Finding → Decision → Action → Verification.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;We used our eQMS to maintain most artifacts (PMS plan, raw data exports, CAPA records). The eQMS made it easier to produce an “audit pack” — but the key was the content and traceability, not the tool.&lt;/p&gt;

&lt;h2&gt;
  
  
  Audit-day evidence pack (what I prepare, and what auditors ask for)
&lt;/h2&gt;

&lt;p&gt;Bring more than the PMS report. We shipped a digital pack with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The current PMS Plan and last approved version.&lt;/li&gt;
&lt;li&gt;The PMS report (signed, dated) and its change history.&lt;/li&gt;
&lt;li&gt;Raw data extracts for any data source referenced (complaints, service logs, literature search outputs).&lt;/li&gt;
&lt;li&gt;Signal evaluation worksheets / decision log.&lt;/li&gt;
&lt;li&gt;Relevant Risk Management File excerpts (with cross-references).&lt;/li&gt;
&lt;li&gt;CAPA records triggered by PMS findings and closure evidence.&lt;/li&gt;
&lt;li&gt;Minutes of multidisciplinary PMS review meetings.&lt;/li&gt;
&lt;li&gt;Training records for staff who ran the evaluations.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you can show a single source-of-truth system where each item is traceably linked, audits go much faster.&lt;/p&gt;

&lt;h2&gt;
  
  
  Common pitfalls that trigger nonconformities
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Vague methodology: “we looked at complaints” without saying how or how many.&lt;/li&gt;
&lt;li&gt;Missing rationale for inaction: auditors expect documented decisions, not silence.&lt;/li&gt;
&lt;li&gt;Poor linkage to risk management / clinical evaluation.&lt;/li&gt;
&lt;li&gt;Incomplete data provenance: where did the complaint counts come from, and who pulled them?&lt;/li&gt;
&lt;li&gt;No evidence of periodic review cadence or missed reviews without documented reason.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Small automation wins we relied on
&lt;/h2&gt;

&lt;p&gt;I’m engineering-brained, so we automated where it reduced audit friction:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Scheduled exports from the complaints system to a controlled folder, with hash/versioning for provenance.&lt;/li&gt;
&lt;li&gt;Dashboards for key metrics (complaints over time, open CAPAs linked to PMS findings) that we could snapshot and export into the report.&lt;/li&gt;
&lt;li&gt;Webhook alerts for spikes that feed into the signal evaluation queue.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You don’t need full-blown ML to pass an audit — auditors care more that your pipeline is reproducible and reviewable than that it’s fully automated.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final practical checklist before you submit the report
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Does the exec summary state concrete conclusions and next steps?&lt;/li&gt;
&lt;li&gt;Can you point to the raw data behind every conclusion?&lt;/li&gt;
&lt;li&gt;Is each conclusion linked to risk-management/clinical-eval files?&lt;/li&gt;
&lt;li&gt;Are actions documented, assigned, and tracked to closure?&lt;/li&gt;
&lt;li&gt;Is the report versioned, signed, and stored in your QMS?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you can answer “yes” to those five, you’re in a good place.&lt;/p&gt;

&lt;p&gt;I’m curious: how are other teams balancing automated signal detection with the need for human-reviewed, auditable rationale? Are you keeping automated flags in a separate queue, or integrating them directly into the formal PMS decision log?&lt;/p&gt;

</description>
      <category>qms</category>
      <category>medtech</category>
      <category>compliance</category>
      <category>regulatory</category>
    </item>
    <item>
      <title>What device users actually notice first when quality starts to fall apart</title>
      <dc:creator>James Whitfield</dc:creator>
      <pubDate>Tue, 28 Apr 2026 18:42:58 +0000</pubDate>
      <link>https://forem.com/jwithfield_qa/what-device-users-actually-notice-first-when-quality-starts-to-fall-apart-2c1m</link>
      <guid>https://forem.com/jwithfield_qa/what-device-users-actually-notice-first-when-quality-starts-to-fall-apart-2c1m</guid>
      <description>&lt;p&gt;I’ve been responsible for quality on Class II products long enough to see the same surface symptoms show up across different companies and tech stacks. In our 200-person shop the first few signs of "quality rot" weren’t flagged in an audit report — they came from users, clinicians, and service teams who had to do the workarounds.&lt;/p&gt;

&lt;p&gt;This post is a short catalog of the things people notice first when a QMS is slipping, the underlying process failures those symptoms usually point at, and a few pragmatic fixes that have actually bought us time while we rebuild controls.&lt;/p&gt;

&lt;h2&gt;
  
  
  What frontline users report (the symptoms)
&lt;/h2&gt;

&lt;p&gt;When quality degrades, the non-QA folks complain about concrete, interrupting problems:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Inconsistent or conflicting instructions: labels, IFUs, or SOPs that don’t match what’s physically on the product or what service techs actually do.&lt;/li&gt;
&lt;li&gt;Guidance gaps: "I guess we should..." moments where there’s no clear, reviewable path for a decision (maintenance, triage, dev changes).&lt;/li&gt;
&lt;li&gt;Shadow SOPs and local checklists: people keeping their own spreadsheets or PDFs because the controlled doc is hard to find or out-of-date.&lt;/li&gt;
&lt;li&gt;Slow, manual change control: engineering submits a change and hears crickets for days or weeks; meanwhile production improvises.&lt;/li&gt;
&lt;li&gt;Escalations from tech support: the same complaint keeps coming back because root cause investigations stall.&lt;/li&gt;
&lt;li&gt;Training mismatches: people are signed-off on SOPs that do not reflect the current process or product variant.&lt;/li&gt;
&lt;li&gt;Traceability gaps: inability to quickly show which revisions of design outputs, risk assessments, and verification artifacts map to a shipped lot or complaint.&lt;/li&gt;
&lt;li&gt;Field actions/near-recalls: before an actual recall you often see tracing, triage, and coordination friction — people asking "who owns this?" and "do we need to tell regulators?"&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are the things that annoy and endanger users, and they’re also the things auditors and notified bodies will notice because they map to control failures.&lt;/p&gt;

&lt;h2&gt;
  
  
  Typical root causes behind those symptoms
&lt;/h2&gt;

&lt;p&gt;The same user-visible problems tend to come from a few recurring process failures:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Poor document discipline: slow doc approvals, uncontrolled drafts, hard-to-find current revisions.&lt;/li&gt;
&lt;li&gt;Fractured change control: approvals bottlenecked in a single person or committee; impact analysis done in a meeting and never captured.&lt;/li&gt;
&lt;li&gt;Weak linkages between processes: complaints, CAPA, design changes, and supplier records live in different silos with manual reconciliation.&lt;/li&gt;
&lt;li&gt;Inadequate supplier visibility: vendors changing parts or processes without timely notification.&lt;/li&gt;
&lt;li&gt;Training treated as a checkbox: signature on a form but no evidence of competence or refreshed content after a change.&lt;/li&gt;
&lt;li&gt;Tool friction: the QMS is harder to use than ad-hoc spreadsheets so people avoid it.&lt;/li&gt;
&lt;li&gt;Staffing/triage failures: no one assigned to run day-to-day complaint triage, so issues age until they become urgent.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you map the symptoms back to these causes, it becomes clearer where to look first.&lt;/p&gt;

&lt;h2&gt;
  
  
  Practical, fast-remediation steps that helped us
&lt;/h2&gt;

&lt;p&gt;When a notified body audit or a field action looms, you don’t have time for a big replatforming project. These are the pragmatic steps that reduced noise and risk in our shop:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Triage and freeze: pause non-critical changes until you clear high-priority complaints and training gaps. Communicate the freeze across teams.&lt;/li&gt;
&lt;li&gt;Quick doc sweep: target the top 10 documents people actually use (IFU, assembly SOPs, service guides). Fix obvious mismatches and publish emergency revisions with traceable rationale.&lt;/li&gt;
&lt;li&gt;Capture impact analysis where people already work: if engineers keep notes in a ticketing tool, add a required attachment or link that becomes the authoritative record for change-control. (We started with simple mandatory fields in our Jira workflow.)&lt;/li&gt;
&lt;li&gt;Automate routing for complaints → CAPA: even simple webhooks that create a CAPA stub from a complaint ticket removes the human hand-off that was stalling investigations.&lt;/li&gt;
&lt;li&gt;Short feedback loops: establish a 48–72 hour acknowledgement window for complaints and a weekly CAPA stand-up so issues don’t age.&lt;/li&gt;
&lt;li&gt;Make training meaningful: require completion of a short, role-specific checklist tied to each document change instead of a general sign-off.&lt;/li&gt;
&lt;li&gt;Improve supplier change visibility: require advance notice for part revisions and add supplier changes to your change-control queue for impact review.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;None of these were glamorous. They were low-tech, quick to implement, and they reduced the number of "who owns this?" interruptions enough to buy the team space to plan longer-term fixes.&lt;/p&gt;

&lt;h2&gt;
  
  
  Longer-term fixes worth budgeting for
&lt;/h2&gt;

&lt;p&gt;If you have the runway, invest in things that remove manual reconciliation:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Connected workflows: link complaints, risk assessments, change control, and CAPAs so you can run impact queries. This reduces rework during audits.&lt;/li&gt;
&lt;li&gt;Better search and discoverability for controlled docs: users should land on the doc they need in two clicks.&lt;/li&gt;
&lt;li&gt;Traceable review and impact artifacts: enforce the habit that impact analysis is captured at change creation, not after approval.&lt;/li&gt;
&lt;li&gt;Integrations with engineering tools: reduce copy-paste by syncing design baseline and DHF items from version control or PLM.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are the moves that transform repeated firefighting into predictable maintenance.&lt;/p&gt;

&lt;h2&gt;
  
  
  Closing — the practical question
&lt;/h2&gt;

&lt;p&gt;From the floor-level friction to the audit room, the things users notice first are almost always the same. I’m interested in the community’s experience: what was the single smallest process change you made that stopped recurring user complaints in your org? How did you get people to adopt it quickly?&lt;/p&gt;

</description>
      <category>qms</category>
      <category>medtech</category>
      <category>compliance</category>
      <category>regulatory</category>
    </item>
    <item>
      <title>Quality culture vs quality theater — what inspectors actually notice</title>
      <dc:creator>James Whitfield</dc:creator>
      <pubDate>Thu, 23 Apr 2026 08:20:05 +0000</pubDate>
      <link>https://forem.com/jwithfield_qa/quality-culture-vs-quality-theater-what-inspectors-actually-notice-2i26</link>
      <guid>https://forem.com/jwithfield_qa/quality-culture-vs-quality-theater-what-inspectors-actually-notice-2i26</guid>
      <description>&lt;p&gt;I’ve been on both sides of audits and inspections enough times to recognize the difference between a QMS that’s alive and one that’s optimized for photo ops. Regulators (FDA, notified bodies under MDR/IVDR, auditors against ISO 13485) don’t come to admire your template library — they come to see whether the system actually influences day-to-day decisions.&lt;/p&gt;

&lt;p&gt;Below are the concrete signals I’ve seen that tip an inspector off to "culture" vs "theater", and the short fixes that moved us from the latter toward the former.&lt;/p&gt;

&lt;h2&gt;
  
  
  What inspectors are actually looking for
&lt;/h2&gt;

&lt;p&gt;Inspectors want evidence that the requirements have been integrated into the way the business makes decisions. They don’t just cross-check clauses; they trace behaviors back to outcomes.&lt;/p&gt;

&lt;p&gt;Typical things they ask for and observe:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Records that show not just completion, but intent and follow-through (e.g., CAPA documentation that links to verification activities, supplier corrective actions and the impact on production).&lt;/li&gt;
&lt;li&gt;How changes are handled in practice: was a risk assessment updated before the change was implemented, or after you discovered problems?&lt;/li&gt;
&lt;li&gt;Who actually knows the procedure — can a line operator explain the “why” behind a work instruction, not just the “how”?&lt;/li&gt;
&lt;li&gt;Open issues and trends: are problems hidden in folders, or being trended and acted on?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In one FDA inspection I supported, the investigator spent more time shadowing production personnel and tracing specific lots back to change records than they did poring over glossy dashboards. The dashboard looked impressive. The trace from a change to the risk file and the production decision was where the conversation got sharp.&lt;/p&gt;

&lt;h2&gt;
  
  
  Quality theater — common red flags
&lt;/h2&gt;

&lt;p&gt;These are the things that look good at first glance but fail the “show me” test:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Batch of training completions all signed on the same date with identical notes. (Often indicates retroactive sign-offs.)&lt;/li&gt;
&lt;li&gt;Design review minutes that are one-page, checklist-only, and lack linked actions or evidence that decisions changed design direction.&lt;/li&gt;
&lt;li&gt;CAPAs with corrective actions that are "training" only, no root-cause evidence or verification steps.&lt;/li&gt;
&lt;li&gt;Closed nonconformances where the evidence is a document revision but no verification that the problem stopped recurring.&lt;/li&gt;
&lt;li&gt;Supplier scorecards with perfect scores but unresolved open quality events.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Inspectors can often tell when records are produced to meet an audit rather than to support control. They look for consistency between what’s on paper and what happens on the shop floor or in the lab.&lt;/p&gt;

&lt;h2&gt;
  
  
  Signals of a living quality culture
&lt;/h2&gt;

&lt;p&gt;Contrast that with the concrete behaviors that indicate a functioning culture:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Findings become actions: a complaint or audit observation turns into a tracked quality event that someone owns, with timebound actions and measurable verification. (We use our QMS so a finding becomes a quality event and shows up on the owner’s dashboard.)&lt;/li&gt;
&lt;li&gt;Documents are living artifacts: work instructions evolve as improvements are discovered and those changes are captured with rationale and verification.&lt;/li&gt;
&lt;li&gt;Cross-functional ownership: design changes are reviewed by manufacturing, QA, RA, and service where relevant — meeting minutes include who disagreed and why.&lt;/li&gt;
&lt;li&gt;Transparent trending: recurring issues show up in management review and trigger strategy-level decisions (supplier change, design mitigation).&lt;/li&gt;
&lt;li&gt;People speak the system: operators and engineers can explain why a process exists, not just how to execute a SOP.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Those signals make an inspector comfortable that the QMS isn’t just a compliance exercise; it’s how the company manages risk.&lt;/p&gt;

&lt;h2&gt;
  
  
  Practical swaps: from theater to culture (what actually worked for us)
&lt;/h2&gt;

&lt;p&gt;We implemented small, practical changes that had outsized effects during audits:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Replace passive signoffs with active evidence: require a piece of work (a photo, a measurement, a code diff, a screenshot) tied to training or approval so signoffs aren’t just checkboxes.&lt;/li&gt;
&lt;li&gt;Force traceability links earlier: require a link from a change request to the risk assessment and to impacted documents before the change moves from “approved” to “released”.&lt;/li&gt;
&lt;li&gt;Make CAPA verification tangible: define measurable verification steps up front (sampling plan, metric threshold) and record their results in the CAPA.&lt;/li&gt;
&lt;li&gt;Day-in-the-life walkthroughs: before audits, do internal “shop-floor tracebacks” where an engineer follows a part through from receipt to shipping and documents what they saw.&lt;/li&gt;
&lt;li&gt;Surface open work: dashboards are fine, but we started embedding a short narrative in management review for each recurring theme — what was done and what’s next.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are process changes, not heroic hires. They require discipline and tooling that supports traceability and ownership.&lt;/p&gt;

&lt;h2&gt;
  
  
  Tools help, but they don’t create culture
&lt;/h2&gt;

&lt;p&gt;A connected QMS that links findings, changes, risk, and CAPA reduces friction. Automation that turns a finding into a quality event, or that forces a required link before state change, helps prevent theater. But tools won’t replace leadership and day-to-day behaviors.&lt;/p&gt;

&lt;p&gt;I’d rather have imperfect records that reflect real problems being worked on than immaculate records that hide issues.&lt;/p&gt;

&lt;h2&gt;
  
  
  Wrap-up — what I watch during inspections
&lt;/h2&gt;

&lt;p&gt;When I’m in an audit room now I listen for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ownership (who will fix this and how will I know?)&lt;/li&gt;
&lt;li&gt;Evidence (can they show me the work?)&lt;/li&gt;
&lt;li&gt;History (has this been tried before? what changed?)&lt;/li&gt;
&lt;li&gt;Impact (did the decision change production, design, supplier choices?)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If those four threads tie together, it’s a culture. If not, it’s theater — and inspectors notice.&lt;/p&gt;

&lt;p&gt;What have you seen in audits that made you think “this company gets it” — or the opposite?&lt;/p&gt;

</description>
      <category>qms</category>
      <category>medtech</category>
      <category>compliance</category>
      <category>regulatory</category>
    </item>
  </channel>
</rss>
