U.S. ENVIRONMENTAL PROTECTION AGENCY
OFFICE OF INFORMATION RESOURCES MANAGEMENT
RESEARCH TRIANGLE PARK. NORTH CAROLINA 27711
DRAFT
AUTOMATED LABORATORY STANDARDS:
EVALUATION OF THE STANDARDS AND
PROCEDURES USED IN AUTOMATED
CLINICAL LABORATORIES
CONTRACT 68-W9-0037, DELIVERY ORDER 035
MAY 1990
Prepared by:
BOOZ'ALLEN & HAMILTON Inc.
4330 East-West Highway
Bethesda, Maryland 20814-4455
301/951-2200

-------
Automated Laboratory Standards:
Evaluation of the Standards and Procedures Used in
Automated Clinical Laboratories
DRAFT
Prepared for
Office of Information Resources Management
U.S. Environmental Protection Agency
Research Triangle Park, North Carolina 27711
May 29, 1990
Prepared by;
BOOZ« ALLEN & HAMILTON Inc.
4330 East-West Highway
Bethesda, Maryland 20814
(301) 951-2200
Contract No. 68-W9-0037

-------
Table of Contents
Executive Summary	iii
Background	1
Findings	5
Practices in Clinical Drug Testing Laboratories	5
Organization and Personnel	6
Laboratory Operations	7
Security	7
Operating Procedures	8
Conduct of the Study	9
Records and Reporting	11
Information Security Practices in Other Clinical Laboratories	11
The Special Case of Blood Screening	14
Standards Applicable to Clinical Laboratories	15
Conclusions	20
Glossary
References
ii

-------
Executive Summary
The U.S. Environmental Protection Agency (EPA) has initiated a program to
ensure the integrity of computer-resident data in laboratories performing analyses
in support of EPA programs by developing standards for automated laboratory
processes. The possession of sound technical data provides a fundamental resource
for EPA's mission to protect public health and the environment.
This report describes the findings of a review of standards and practices used
in existing automated systems in a limited number of laboratories in a clinical
setting. These laboratories conduct either standard clinical pathology/clinical
chemistry analyses or forensic determination of the presence of illicit drugs in urine
specimens for commercial or government (military and civilian) clients. EPA has
chosen to study clinical laboratory standards and practices under the assumption
that such laboratories generate data of high integrity. Additionally, these
laboratories are regulated by a number of Federal and state agencies, as well as being
supported or accredited by a number of professional organizations. Both the
regulatory agencies and the associations provide a variety of requirements,
standards, and guidance for the clinical laboratories to follow in their day-to-day
operations.
Representatives of six forensic drug testing laboratories were interviewed to
determine the standards, practices, and control techniques used in each facility.
Through this evaluation, it was determined that the drug testing program that
serves the needs of the U.S. Army, the Department of Transportation, and the
Department of Health and Human Services, as well as some private clients, contains
standards for procedures and safeguards that could serve as models for EPA's
computerized data acquisition and analysis systems. These standards follow the
spirit of the Good Laboratory Practice standards already published by EPA for the
Federal Insecticide, Fungicide, and Rodenticide Act and the Toxic Substances
Control Act. These standards should be considered by the EPA in drafting standards
on computer operations, software design, sample custody, and computerized
analytical chemistry operations for both EPA laboratories as well as contractors
iii

-------
conducting analytical chemistry work for EPA under any of its environmental
monitoring programs.
Additionally, many of the drug testing laboratories surveyed have
implemented extensive security practices that help maintain the integrity of their
manual and computer-resident data. These include strict chain-of-custody
procedures (with a manual record and signatures) as well as a detailed manual audit
trail or computer-resident transaction log providing the audit trail. Also, individual
terminals could be permanently locked out of certain data sets or could access files
only at certain times of the day, corresponding with normal hours of operation. By
using these and other control mechanisms, the laboratories have experienced little
or no litigation related to data validation and sample custody, and have successfully
defended their practices and results in court.
Finally, clinical laboratories in a hospital setting were examined via staff
interviews and literature review. Although these laboratories may be less of a role
model than are the drug testing laboratories for EPA to follow, due to the
importance of data availability over data confidentiality, a variety of techniques for
data security were identified that EPA may want to implement. These include
unique passwords, a hierarchy of password protection based on the job level of the
individual, a record of every password owner that accesses a particular data set, and
the ability of a terminal to shut down if unauthorized attempts are made to access
the system.
i v

-------
i
Background
The U.S. Environmental Protection Agency (EPA) has initiated a program to
ensure the integrity of computer-resident data in laboratories performing analyses
in support of EPA programs by developing standards for automated laboratory
processes. The possession of sound technical data provides a fundamental resource
for EPA's mission to protect the public health and environment, regardless of the
activities of the specific environmental programs. The activities of these
environmental programs are diverse, and include basic research at EPA's
environmental research centers, environmental sample analyses at EPA's regional
laboratories and contractors' laboratories, and product registration relying on
analytical data submitted by the private sector.
EPA recognizes that the implementation of an automated laboratory
standards program will require each laboratory to allocate resources of dollars and
time for the program's execution. Experience has shown that in developing and
using a proper standards program, a net savings may be achieved, as acquisition,
recording, and archiving of data will be improved with a net reduction in test
duplication.
Within EPA, the Office of Information Resources Management (OIRM) has
assumed the objective of establishing an automated laboratory standards program.
The need for this program is evidenced by several factors. These include the rising
use of computerized operations by laboratories, the lack of uniform standards
developed or accepted by EPA, evidence of problems associated with computer-
resident data, and the evolving needs of EPA auditors and inspectors for guidance in
evaluating automated laboratory operations.
Laboratories collecting data for EPA's programs have taken advantage of
increasing technology to streamline the analytical processes. Initially, automated
instrumentation entered the laboratories to increase productivity and enhance the
accuracy of reported results. Computers maintaining data bases of results were then
used for data management and tracking. These computer systems were integrated
into more sophisticated laboratory information management systems (LIM5).
1

-------
Methods for data reporting include electronic mail, electronic bulletin boards, and
direct links between central processing units. Each of these advances necessitates
thorough quality control procedures for data generation, storage, and retrieval to
ensure the integrity of computer-resident data.
Currently, EPA has no Agency-wide guidelines for laboratory information
integrity that laboratories collecting and evaluating computer-resident data must
follow. The requirements that must be considered in developing automated
laboratory standards come from a variety of sources, including the requirements of
the Computer Security Act of 1987 (P.L. 100-235, January 8, 1988) and various EPA
program-specific data collection requirements under Superfund, the Resource
Conservation and Recovery Act, the Clean Water Act, and the Safe Drinking Water
Act, among others. Additionally, OIRM has developed electronic transmission
standards and is developing a strategy for electronic recordkeeping and electronic
reporting standards that will impact on all Agency activities. The development of
uniform principles for automated data in EPA laboratories, regardless of program,
will take into account the common elements of all these data collection activities,
and provide a minimum standard that each laboratory should achieve.
There is increasing evidence of problems associated with the collection and
use of computer-resident laboratory data supporting various EPA programs. To
illustrate, as of November 1989, EPA's Office of the Inspector General was
investigating between 10 and 12 laboratories in Superfund's Contract Laboratory
Program (CLP) for a variety of allegations, including "time traveling" and
instrument calibration violations. In "time traveling," sample testing dates are
manipulated, by either adjusting the internal clock of the instrumentation
performing the analyses or manipulating the resultant computer-resident data.
(Hazardous waste samples must be assayed within a prescribed time period or the
results may be compromised.) Additionally, calibration standard results have
allegedly been electronically manipulated and other calibration results substituted
when the actual results did not meet the range specifications of the CLP procedure
being followed. If proven, these allegations may be treated as felonies.
Because the introduction of automation is relatively new and still evolving,
no definitive guidelines for EPA auditors and inspectors have been developed.
Inspectors must be alert to the steps in those procedures used by the laboratories
2

-------
generating and using computer-resident data where the greatest risk exists. These
critical process points indicate the magnitude of control that should be placed on
each step of the process. If adequate controls are not present, the remainder of the
process cannot correct a deviation, and the entire process will provide no reliable
conclusions. Automation introduces many new variables into a system, each with
its own set of critical process points. Inspectors must verify that laboratory
management has recognized the various risks and has instituted an appropriate risk
management program.
As part of EPA's program to ensure the integrity of computer-resident data,
EPA reviewed the policies and procedures in place in clinical laboratories, since it
was reasoned that the data generated by such laboratories must be of exceptional
quality because it impacts directly on the lives and livelihood of individuals. Using
data from hospital-based clinical laboratories, medical practitioners must make
decisions on patient care that will have a tremendous impact (positive or negative)
on patients' health. In relying on the results of clinical laboratories conducting
forensic urinalysis for illicit drugs, employers must make significant employment
decisions about their workforce. It was hypothesized that some of the standards in
place in automated clinical laboratories could be applied to the automated
environmental chemistry laboratory environment. As a result of its research in
automated clinical laboratories, EPA identified many procedures that could be
applied to automated laboratories.
Other areas of evaluation in developing the standards program include a
review of current automated technology; a survey of current automated
environmental chemistry laboratory practices; an evaluation of standards, methods,
and controls used in managing automated financial systems; and an analysis of the
applicability of EPA's Good Laboratory Practice regulations to automated
laboratories. The findings of each of these evaluations are provided in separate
reports.
Our evaluation focused on three types of clinical laboratories: laboratories
associated with hospitals, laboratories conducting forensic drug urinalysis, and
laboratories screening blood products for antibodies to human immunodeficiency
virus (HIV). Each type of clinical laboratory provided differing levels of practical
3

-------
information. For the purposes of this evaluation, drug testing laboratories provided
the best role mode! for analytical chemistry laboratories supporting EPA programs.
4

-------
Findings
Practices in Clinical Drug Testing Laboratories
Management, technical, and quality assurance personnel were interviewed at
six mid-Atlantic drug testing facilities engaged in urine drug testing for either
military or civilian agencies as well as commercial clients. The drug testing
programs supported by these laboratories are primarily overseen by the military, by
the National Institute on Drug Abuse (NIDA), or by the Department of
Transportation (DOT). The interview questions were related to laboratory
computer-controlled equipment, computer security, and computer-resident data
integrity. The questions and discussions followed a pattern set by the Good
Laboratory Practice standards1 that could reasonably be applied to computers, to
computer software, and to analytical chemistry laboratories conducting work using
computer-linked instrumentation. The questions focused on several general areas,
including personnel and management practices, computer security principles, chain
of custody of samples, the type of integrated computer-controlled analytical
instrumentation systems that were effective in terms of both sample handling and
data security, and data validation and retention.
Answers to the series of discussion questions were tabulated to determine
common points of reference or differences between the operations and standards of
the laboratories with respect to:
•	Organization and personnel
•	Laboratory operations, including security and standard operating
procedures
•	Conduct of each study, including requirements for data entry, data
changes, data validation, and chain of custody
Sections below are related to the Good Laboratory Practice standards as published by
EPA under the Toxic Substances Control Act (TSCA) at 40 CFR Part 792.
5

-------
•	Requirements for records and reporting
•	Standards for operating the drug testing program.
The following discussion addresses the findings in the above order.
Organization and Personnel
Personnel (40 CFR 792.29)
In all cases, the laboratory technicians had a range of educational and work
experience that was suitable for their technical assignments in drug testing. Those
who had additional background in computer programming, operations, or
computerized data acquisition filled those positions where more direct computer
work was needed. Personnel in positions of computer operators, programmers,
system administrators, or computer maintenance generally had more formal
computer training or training with a computer manufacturer, as well as internal
training. Computer hardware maintenance and operating systems upgrades were
handled by outside computer contractors at the military laboratories and by
corporate information systems staff at the NIDA-certified laboratories.
Lower level chemistry or clinical laboratory technicians received training and
supervision for the equipment they were assigned to but the amount of computer
training was minimal. In general, all laboratories had standard operating
procedures (SOPs) that dealt with all aspects of the technicians' or technologists'
work.
The Quality Assurance Unit and Computer Operations (40 CFR
792.35)
In general, computer operations are not overseen or examined by the
laboratory's QAU. The computer group itself may have a rudimentary QAU with
standard operating procedures.
6

-------
Laboratory Operations
Security
Basic Password I Logon Security (40 CFR 792.61)
All laboratories where personnel were interviewed use a routine hierarchical
form of password(s) control, consisting of a simple name-based logon that allows the
individual access to the terminal. A unique password then allows the individual
access to pre-approved menus or programs. Password control and/or change
systems vary from lax (passwords are never changed, or are changed once or twice a
year but the technician may continue to use the old password) to strict (passwords
are changed monthly on order from the central computer, and existing passwords
are retired). One system has the capability of requiring answers to personal
identifier questions in addition to the password system.
Additional security is obtained by locking certain terminals out of the system
or refusing to accept data outside the authorized work schedule times. Most systems
have an automatic sign-off or time-out should the user leave the terminal. This
may range from 1 to 15 minutes.
Password access varies among laboratories, from individual access only to
maintenance of a complete list of users and their passwords secured in the corporate
office. Administrative action for the unauthorized use of a password or password
swapping ranges from lax (in a policy statement but not monitored or enforced) to
dismissal with no further warning. In general, laboratory personnel deny that
password exchange has been a problem.
Facility Physical Security (40 CFR 792.41)
All computers are subject to data loss in the event of a power failure. The
extent of the loss will depend on the software and the computer. An
uninterruptible power supply (UPS) system (such as a battery or generator) will be of
assistance, as will a backup computer system. The UPS will ensure an orderly
shutdown to prevent damage to the computer, but some data (i.e., the data in
process at the time) will be lost. Each laboratory has a system of determining which
7

-------
data have been lost and which samples must be rerun. Data generated by hand will
be entered at a later time once the computer system has been restarted and is
functional. All such data are archived as raw data.
All facilities have some sort of physical security for their computers. This
may be a locked computer room or it may be separate and restricted areas
throughout the facility. Entrance to any physical area may be restricted to
authorized personnel and all entries may be recorded in the computer.
The existence and use of external connections to the computer vary among
the laboratories. In general, any modem line will be highly secure. This may be
accomplished by physically disconnecting the incoming line until its use is
authorized. Modem lines are generally used by maintenance contractors and their
use is monitored and recorded.
Most laboratories do not permit "phone-ins" for test results, although one
permitted phone access after the client's identification was verified and he/she
would then be called back by laboratory personnel with the results.
Operating Procedures
Standard Operating Procedures (40 CFR 792.81)
Most equipment and operations are covered by SOPs. The computer section
itself may have SOPs for the equipment and maintenance.
In-House Development of Computer Software (40 CFR 792.61)
The software employed in drug testing laboratories is generally developed in-
house due to its specialized nature. In most cases, there is little evidence of
following software development life cycle procedures, although this is planned to be
part of the next generation of computer software for these laboratories. However,
several laboratories claim to use the software development life cycle and have
written software that is in the validation documentation stage now. The
laboratory's Quality Assurance Unit is not typically involved in the development of
the software.
8

-------
Computer software is not always validated in any formal fashion. As
software modifications are developed, in most cases, they are functionally evaluated
in a development environment and further tested to make certain that the existing
software parameters are unchanged. In addition, some of the laboratories perform
parallel runs of current/modified software. Once this is completed the modification
can be put into the production environment. There is documentation for this along
with a formal procedure for modification to be followed in half of the laboratories
where personnel were interviewed.
Conduct of the Study
Audit or Validation of Manually Entered Data (40 CFR 792.130)
All laboratories have some data that must be entered manually. This may be
minimal and occur at sample receipt control or it may happen throughout the
testing process when special tests are required. All laboratories have some
validation procedure, manual or automatic, for these data. Validation of manually
entered data may be contemporaneous with the work or it may be retrospective, and
may involve one or more people. Data entry validation may be by double entry.
Data Change Controls (40 CFR 792.130)
In clinical testing laboratories (e.g., hospital or clinical contract laboratories),
the test results are generally held in the work station computer memory until
checked and approved by a supervisor, at which time the data are forwarded to the
main computer where no further changes are permitted. The first-level check is to
make certain that no result is out of range thus requiring an immediate duplicate
test. In these tests, there is no concept of "false positive" or "false negative."
In the drug testing laboratory, however, all data are forwarded immediately
upon acquisition to the main computer. In drug testing, a false negative may be
permitted but not a false positive. Accordingly a positive result at the screening
level leads automatically to a confirmatory test (mass spectrum) on a new aliquot
(portion or subsample) of the specimen.
9

-------
Edit or data change controls vary among laboratories both by the nature of the
work and the age or sophistication of the computer software. Read/write/edit access
levels depend upon a person's job level, and may entail a technician using several
different programs to enter, verify, and release results. In some instances, two or
more staff members, none below the supervisory or certified scientist level, are
allowed to release the results.
Audit trail procedures depend on the program and on the computer system
in use. An audit trail may be computer-resident, on paper, or both. An audit trail
must show the date the change was made, who made the change, the original data
element, the new data element, and the reason for the change. In one drug-testing
laboratory, there is no computer-resident audit trail for changed data, as the system
required too much memory and has been turned off; a paper trail has been
substituted. In most drug testing laboratories, there is an adequate audit trail, either
on paper or in an unchangeable transaction log. Some less secure systems maintain
only a log of who accessed the system and not of any changes made. Many times the
audit trail only keeps a record of editing, allowing authorized personnel to conduct
inquiries without maintenance of a record.
Sample Custody and Results Validation (40 CFR 792.107)
In view of the significance of drug test results it is not surprising that the
chain-of-custody procedures in drug testing laboratories are both elaborate and time
consuming. Chain-of-custody paperwork starts when the specimens are produced,
and the paperwork always accompanies the specimens as they are moved to the
testing laboratory and through the screening and confirmation procedures. Logging
the specimens into the testing laboratory is frequently done by double-entry manual
systems or via bar coding. Specimens are always held in a secure area separated
from the testing areas. Aliquots of the specimens are signed out to the technicians
for analyses. The original specimens are retained in the secure area for one to two
weeks for negative results, and one year for positive findings. A full accounting is
retained showing every activity related to each specimen with accompanying
mandatory manual signatures at each step. The final results are matched back
against the entire chain-of-custody history of the specimen before the results are
released.
10

-------
The chain-of-custody procedures as well as the analytical procedures are
sufficiently secure and auditable that there has been little if any litigation based on
the assumption of sample identity errors or handling errors in the laboratory over
the several years that the urine testing procedure has been in place.
Records and Reporting
Data Retrieval and Data Retention (40 CFR 792.190; 40 CFR
792.195)
There are no guidelines as such for data recovery from storage; this may be set
by policy at each laboratory.
Data retention standards are often set by clients or by legal guidelines. In the
NIDA-approved laboratories, data retention extends from 30-day to 3-year on-line
maintenance to 2-month maintenance of tape backups, to 5 to 7 years for
worksheets, and to the indefinite maintenance of microfiche and magnetic tape.
Data Storage and Data Backup Procedures (40 CFR 792.190)
All computer systems are backed up on a schedule to disks or tapes depending
on the laboratory and the computer hardware. Backup schedules can range from
daily to monthly. Storage of data is not standardized nor is any regular attempt
made to determine if the tapes or disks are still readable. Since the stored data
continue to be retrievable, the assumption is that the tapes have not as yet
deteriorated. Some laboratories contract storage out to tape management firms.
In drug testing laboratories storage of the paper hard copies is also common
(most often on microfiche after some period of time). This is required as the hard
copies have the chain-of-custody information, including signatures.
Information Security Practices in Other Clinical Laboratories
Intrinsic to the operation of hospital laboratories is an urgency for availability
of information - a patient's health, and even his or her life, depends on the treating
11

-------
physician's access to important information to make immediate decisions
concerning patient treatment. For this reason, some data security issues, such as
confidentiality, are given lower priority than data availability in the hospital setting.
Additionally, due to the variety of specialists that might have an interest in the
records of a particular patient, most hospital healthcare workers are granted access to
read any patient record. Many hospitals are currently grappling with this issue of
ease of access (see Gardner, 1989a, with companion sidebars, and Romano, 1987).
Findings obtained in interviews with hospitals lead to similar conclusions with the
Gardner series (1989).
Security procedures in place in various hospital laboratories include the use
of individual, password-type controls, including two-step sign-on codes and
passwords, selected by the user and changed every few months (Gardner, 1989b) or
assigned passwords, changed every six months (Gardner, 1989c). Additionally,
physicians may have a separate password serving as electronic signature for orders
and attestations. (Gardner, 1989b) Hospitals may use a hierarchy of user levels and
associated authorized access levels. [However, all physicians, nurses, and medical
students may have access to all clinical data (Gardner, 1989c).]
Additionally, hospital systems may involve the hardware in security systems.
Some systems can limit the availability of each patient's data to particular terminals
(Gardner, 1989b) or particular times (Gardner, 1989a). For example, a pharmacist
might only be able to sign on to terminals in the pharmacy during its normal hours
of operation. Additionally, some hospital systems have the ability to "freeze" (lock
out) a terminal if a user repeatedly enters an incorrect password or tries to access
information beyond the user's clearance level; data processing staff must be called to
unfreeze the terminal. (Gardner, 1989c)
Some systems provide "celebrity" protection to well-known patients, which
records the identity of each user who examines the patient's data, or permits a user
to abort the attempted access without leaving a record (Gardner, 1989c). Other
systems control remote access of computer-resident information by using dial-back
verification to verify that a request for access is from an authorized physician
(Gardner, 1989c). [However, other hospitals are not using the dial-back mechanism
to protect against the call-forwarding feature of many phone systems (Gardner,
1989d).]
12

-------
Policies regarding computer security in hospitals and elsewhere are only as
useful as their implementation permits them to be. Forbidding users to "borrow"
passwords can only be successful if the system is capable of minimizing the
temptation to "borrow" passwords in the first place. One hospital in Florida has
instituted a policy of immediate access to system passwords 24 hours per day for
legitimate newcomers. The arrangement has been very useful, especially for
medical students and interns, who rotate frequently (Gardner, 1989e). Another
hospital reported that its staff had such difficulty remembering access codes that
printed directions and all staff members' passwords were posted on the computer
terminal (Romano, 1987). Clearly, password protection must not be too
cumbersome to use.
If a hierarchical access system is instituted, the levels of access must be
thoroughly planned, or access might be misunderstood at best, and abused at worst.
For example, one hospital reportedly allowed licensed practical nurses (LPNs) to
access medication charting even though LPNs are not permitted to give
medications. Because of this access privilege, LPNs interpreted the situation as a
change in hospital policy and began providing medications to patients (Romano,
1987). Access to medication charting should not have been granted to the LPNs in
the first place.
A current concern in hospitals is the use of "cross-patient searching," in
which a user can aggregate information across patient records, such as all instances
of adverse drug interaction when a certain combination of drugs is provided.
Although this ability is a benefit to epidemiologists and medical researchers, the
potential for abuse is prevalent (Gardner, 1989a). It is thought that the current lack
of standardization across the many systems used among different hospitals is
actually enhancing patient record security (Gardner, 1989a).
Detecting and correcting errors in computer-resident data is important, but
has received less attention than it should. Basden and Clark (1980) examined two
kinds of errors, syntax and context errors, occurring in the use of a hospital
information system, CLINICS™, at a teaching hospital. Syntax error concerns the
credibility of entries, such as blood pressure being outside a certain range or a month
containing greater than 31 days. Context error, on the other hand, concerns the
13

-------
relationship between a particular datum and other entries. In the medical field,
examples of context error include the date of a test authorization not being a date the
patient was registered, or an indication that the patient has a sex-linked disease
(such as prostate cancer) not appropriate to the individual's sex. The authors
concluded in their study that syntax checking alone would reduce the error rate to
around 7 percent, which was still felt to be unacceptable. To reduce the error rate
further, the authors recommended implementing a system to check context as well
as a system to validate the entries themselves (Basden and Clark, 1980).
Quality of the data entered can be enhanced by instituting policies of data
ownership, Each professional must enter his or her own data directly into the data
base, using the password assigned to the professional, and no other (Romano, 1987).
Additionally, integrity of data can be protected by insisting that entry of information
on the computer be performed as close as possible to the source of information to
avoid transcription errors.
The Special Case of Blood Screening
Laboratories involved primarily in screening blood products for antibodies
against the virus responsible for causing acquired immunodeficiency syndrome
(AIDS) were unwilling to discuss their information management procedures.
Attempts were made to interview representatives of the Whitman-Walker Clinic
(Washington, D.C.), the American Red Cross (Washington, D.C.) Alpha Therapeutic
(Memphis, Tennessee), and Baxter Healthcare Corporation (Deerfield, Illinois), all of
which conduct extensive serological testing. The consensus seems to be that the first
line of security for a data system is not to discuss the system at all with those outside
the ones who need to know. Although EPA's programs could probably benefit from
the experience of this industry, their security is too valuable to be disclosed
inadvertently.
Indeed, AIDS antibody testing is a highly sensitive issue in clinical
laboratories in general. Hospital laboratories surveyed indicated that results of the
various AIDS assays are never entered into the hospital information system, but are
kept only as paper records to restrict access to the information. This practice is
apparently typical of most hospital laboratories (Gardner, 1989f).
14

-------
Standards Applicable to Clinical Laboratories
Standards for the operation of clinical laboratories come from a variety of
sources, including professional organizations such as the American Society for
Testing and Materials (ASTM), the College of American Pathologists (CAP), and the
Joint Commission on Accreditation for Healthcare Organizations (JCAHO), from
legislation, such as the Clinical Laboratory Improvement Act, and from government
agencies, such as the National Institute on Drug Abuse (NIDA). Depending on the
types of analyses conducted, any individual laboratory will be encouraged or
required to follow the standards of one or more of these organizations.
The American Society for Testing and Materials (ASTM) has developed a
series of more than 8,000 voluntary standard guides for a variety of disciplines,
including clinical laboratory computer system operations. Examples of these
automation standards include the following:
E 1029, Guide for Documentation of Clinical Laboratory Computer Systems
E 792, Guide for Computer Automation in the Clinical Laboratory
E 1246, Reporting Reliability of Clinical Laboratory Computer Systems.
These standards were developed using existing ASTM standards for computer
systems and by consulting representatives of the College of American Pathologists.
Additionally, the College of American Pathologists (CAP) has developed
standards for laboratory accreditation (CAP, 1988). CAP is a national medical
speciality society offering member services, quality assurance programs, and
management resources designed to enhance and improve laboratory services for
physicians and the public. CAP has developed five standards that specify the
minimum requirements to achieve and maintain accreditation. These cover
requirements for the director and other personnel in the pathology service or
medical laboratory, resources and facilities, quality assurance, quality control, and
inspection requirements. The standards do not distinguish between manual and
15

-------
automated operations in their statement or subsequent interpretation in the
document. For example, the standard for resources and facilities is as follows:
The pathology service shall have sufficient and appropriate space, equipment,
facilities, and supplies for the performance of the required volume of work
with accuracy, precision, efficiency, and safety. In addition, the pathology
service shall have effective methods for communication to ensure prompt
and reliable reporting. There shall be appropriate record storage and retrieval.
(CAP, 1988, p. 5)
Additionally, CAP has prepared a series of formal inspection checklists that are used
for either yearly self-evaluations or on-site inspections conducted by CAP every two
years. Selected checklists cover the following aspects of laboratory operation:
Section I, Laboratory General
Section II, Hematology [e.g., blood cell counts]
Section III, Clinical Chemistry [e.g., serum cholesterol testing]
Section III-A, Urinalysis [e.g., glucose or occult blood testing]
Section III-B, Clinical Toxicology/Therapeutic Drug Monitoring
Section IV, Microbiology
Section V, Transfusion Medicine [e.g., blood banking]
Section VI, Diagnostic Immunology and Syphilis Serology
Section VII, Nuclear Medicine [radiolabeled diagnostic procedures]
Section VIII, Anatomic Pathology and Cytology
Section IX, Cytogenetics [e.g., amniocentesis]
Section X, Clinical Histocompatibility [e.g., tissue typing for transplants]
Section XXV, Limited Service Laboratory
Section XXX, Ancillary Testing
The Laboratory General checklist, for example, contains six pages of questions
concerning laboratory computer services, and includes specific questions on the type
of computer system used, the extent of its use, the operating environment for the
hardware, the qualifications of the computer operators, procedures for data entry
and reporting, for data retrieval, for data storage, and for maintenance.
16

-------
The Joint Commission on Accreditation of Healthcare Organizations
(JCAHO) is a private, not-for-profit accreditation agency formed to encourage the
voluntary attainment of uniformly high standards of healthcare. The organization
is constituted of membership from the American College of Surgeons, the
American College of Physicians, the American Hospital Association, and the
American Medical Association. The JCAHO develops standards, surveys healthcare
facilities (not only the laboratory operations, as does CAP), and may grant three-year,
renewable accreditation to hospitals and other healthcare facilities. The standards
address all facets of healthcare, including a chapter on "Pathology and Medical
Laboratories," which focuses on quality issues related to decentralized laboratory
testing. JCAHO standards apply to clinical laboratories, but do not directly address
the quality of laboratory automation, except as it pertains to the instrumentation
and/or facilitates the functions of the laboratory. In general, JCAHO endorses CAP
accredited laboratories, except in the areas of safety and blood banking, which must
be reviewed separately by JCAHO.
The National Committee on Clinical Laboratory Standards (NCCLS) is
affiliated with the American National Standards Institute (ANSI). Its members
include government agencies, professional societies, clinical laboratories, and
industrial firms with interests in clinical laboratory testing. The purpose of NCCLS
is to promote the development of national voluntary standards for clinical
laboratory testing and to provide a consensus mechanism for defining and resolving
problems that influence the quality and cost of laboratory work performed. It
publishes standards and guidelines, including ANSI/NCCLS ASI-1, Preparation of
Manuals for Installation, Operation, and Repair of Laboratory Instruments,
published in 1981. ANSI/NCCLS have published eight additional standards, all of
which concern specific laboratory assays and performance standards.
The Clinical Laboratories Improvement Act of 1967 (CLIA), as amended by the
Clinical Laboratory Improvement Amendments of 1988 (CLIA '88), concerns
laboratories accepting specimens in interstate commerce. Under CLIA, clinical
laboratories are licensed on a yearly basis and are subject to on-site inspections.
CLIA's implementing regulations, found at 42 CFR Part 74 (Clinical Laboratories),
include provisions for obtaining a license, quality control, personnel standards,
proficiency testing, and general provisions, such as records, equipment, and
facilities. The regulations address quality control and proficiency testing from the
17

-------
perspective of assay validation arid instrument calibration, not the general
perspective of information handling. With the exception of references to
instrumentation, the regulations do not directly address automation.
Recently; the Health Care Financing Administration of the Department of
Health and Human Services developed a final rule (currently in the comment
period) that will consolidate CLIA's implementing regulations contained in Part 74
with other regulations concerning Medicare and Medicaid programs under a new
part, 42 CFR Part 493, which will be effective September 10, 1990 (U.S. Department of
Health and Human Services, 1990).
The National Institute on Drug Abuse (NIDA) has published Mandatory
Guidelines for Federal Workplace Drug Testing Programs (U.S. Department of
Health and Human Services, 1988). As stated in the preamble to those guidelines
(U.S. Department of Health and Human Services, 1988, p. 11970), the guidelines can
be distinguished from the CL1A certification requirements by the following:
•	Rigorous chain-of-custody procedures for collection of specimens and
for handling specimens during testing and storage;
•	Stringent standards for making the drug testing site secure, for
restricting access to all but authorized personnel, and providing an
escort for any others who are authorized to be on the premises;
•	Precise requirements for quality assurance and performance testing
specific to urine assays for the presence of illegal drugs; and
•	Specific educational and experience requirements for laboratory
personnel to ensure their competence and credibility as experts on
forensic urine drug testing, particularly to qualify them as witnesses in
legal proceedings which challenge the findings of the laboratories.
The NIDA guidelines do stress documentation and records retention [section 2.4(m)]
and the importance of a quality assurance program (section 2.5). Similar to the CLIA
regulations, however, with the exception of references to instrumentation, the
guidelines do not address automation directly.
18

-------
The Department of Transportation has developed Procedures for
Transportation Workplace Drug Testing Programs (49 CFR Part 40; Department of
Transportation, 1989), which apply to transportation employers (including self-
employed individuals) conducting drug urine testing programs pursuant to agencies
of the Department. This rule closely follows the "Mandatory Guidelines" published
by NIDA.
In the drug testing laboratories that conduct work for the U.S. Army, the
following standards are applied:
•	Army Standard 380-380 for computer security
•	Army regulation 600-85 for chain of custody in the drug abuse program
•	Army Surgeon General's standard operating procedures for drug
testing.
These standards formed the basis for NIDA's mandatory guidelines.
In addition, several states have additional standards for firms conducting
drug testing on samples obtained from within their state jurisdiction whose results
are reported back to that state.
19

-------
Conclusions
At this time, EPA has no Agency-wide protocols that laboratories collecting
and analyzing computer-resident data must follow. In addition, there is mounting
evidence of real and potential problems with computer-resident data used to
support various EPA programs. In developing its program to ensure the integrity of
computer-resident data, EPA has studied the standards and practices used in other
disciplines. EPA may draw on the experience of several types of laboratories, on
experience with several levels of data security, and on the standards used in a
number of industries to design standards for computer security and data integrity in
EPA laboratories and for EPA analytical chemistry contractors. These standards are
achievable in today's instrument and computer software market, and they should be
given consideration for rapid implementation in the EPA system.
EPA has studied the standards and practices used in other types of
laboratories, including clinical pathology/chemistry and forensic drug testing
laboratories. Upon review of the literature and interviewing of laboratory
personnel and others, it was determined that the "human" laboratories (clinical and
forensic) adhere to strict guidelines and standards related to data integrity, for both
manual and computer-based data. This is due to the highly sensitive nature of the
tests and the laws and standards related to patient/client confidentiality.
In another paper in this series, EPA looked closely at the data security and
integrity issues of the financial industry. That industry recognized many years ago
that financial operations needed to be computerized, but that the computerized
operations had to embody no greater risks to data integrity than the traditional
manual procedures and auditing safeguards. There is no question that this has been
accomplished for this industry.
Standards of accountability and security are also very high in the drug testing
industry. Clearly, the client cannot permit data manipulation to change a positive
result to a negative result. Testing individuals for evidence of the use of illicit drugs
cannot permit questionable sample handling that leads to to affixing an
identification label erroneously. Although a bank's data error is covered by
insurance, the data error in a drug testing program is not.
20

-------
Legal as well as practical forces have drawn the attention of the health care
industry to the integrity of computer-resident data and computer security.
Although the healthcare industry appears to be willing to accept a higher percentage
of errors or a lower degree of computer security than the financial industry, the risks
permitted are in general manageable. The argument in the healthcare industry,
which is not applicable to the financial industry, is that speed and access to
laboratory data may be critical to a life, but billings to a patient account can wait.
Accordingly, the occasional loss of patient data security may be tolerated.
The data acquisition needs of EPA have elements of both the rigid and the
tolerant systems. Environmental monitoring studies have an impact directly on
dollars and may have an effect on human health and safety. Health and safety data
on chemicals, required by several EPA offices, have an impact on corporate earnings
and on human health.
In order to assess the risks attendant on environmental release of chemicals,
and in order to protect the health of the population and the environment, EPA
must rely on each data element presented for analysis. The validity of the data may
rest on the accuracy of the test used, but the integrity of the data rests on an
unimpeachable sample custody procedure, on secure computers, on auditable data
editing, and on the integrity and professionalism of laboratory and management
personnel.
21

-------
Automated Laboratory Standards Program
GLOSSARY
Application controls - one of the two sets or types of controls recognized by
the auditing discipline. They are specific for each application and include
items such as data entry verification procedures (for instance, re-keying all
input); data base recovery and roll back procedures that permit the data base
administrator to recreate any desired state of the data base; audit trails that not
only assist the data base administrator in recreating any desired state of the
data base, but also provide documentary evidence of a chain of custody for
data; and use of automated reconciliation transactions that verify the final
data base results against the results as reconstructed through the audit trail.
Application software - a program developed, adapted, or tailored to the
specific user requirements for the purpose of data collection, data
manipulation, data output, or data archiving [Drug Information Association].
Audit trail - records of transactions that collectively provide documentary
evidence of processing, used to trace from original transactions forward to
related records and reports or backwards from records and reports to source
transactions. This series of records documents the origination and flow of
transactions processed through a system [Datapro]. Also, a chronological
record of system activities that is sufficient to enable the reconstruction,
reviewing, and examination of the sequence of environments and activities
surrounding or leading to an operation, a procedure, or an event in a
transaction from its inception to final results [NCSC-TG-004].
Auditing - (1) the process of establishing that prescribed procedures and
protocols have been followed; (2) a technique applied during or at the end of a
process to assess the acceptability of the product. [Drug Information
Association]; (3) a function used by management to assess the adequacy of
control [Perry], That is, auditing is the set of processes that evaluate how well
controls ensure data integrity. As a financial example, auditing would
include those activities that review whether deposits have been attributed to
the proper accounts; for example, providing an individual with a hard-copy
record of the transaction at the time of deposit and sending the individual a
monthly statement that lists all transactions.
Automated laboratory data processing - calculation, manipulation, and
reporting of analytical results using computer-resident data, in either a LIMS
or a personal computer.
Availability - see "data availability."
G-l

-------
Automated Laboratory Standards Program
Back-up - provisions made for the recovery of data files or software, for restart
of processing, or for use of alternative computer equipment after a system
failure or disaster [Drug Information Association].
Change control - ongoing evaluation of system operations and changes
during the production use of a system, to determine when and if repetition of
a validation process or a specific portion of it is necessary. This includes both
the ongoing, documented evaluation, plus any validation testing necessary to
maintain a product in a validated state [Drug Information Association].
Checksum - an error-checking method used in data communications in
which groups of digits are summed, usually without regard for overflow, and
that sum checked against a previously computed sum to verify that no data
digits have been changed [Drug Information Association].
Cipher - a method of transforming a text in order to conceal its meaning.
Confidentiality - see "data confidentiality."
Control - "that which prevents, detects, corrects, or reduces a risk" [Perry], and
thus reasonably ensures that data are complete, accurate, and reliable. For
instance, any system that verifies the sample number against sample
identifier information would be a control against inadvertently assigning
results to the wrong sample.
Computer system - a group of hardware components assembled to perform in
conjunction with a set of software programs that are collectively designed to
perform a specific function or group of functions [Drug Information
Association].
Data - a representation of facts, concepts, or instructions in a formalized
manner suitable for communication, interpretation, or processing by human
or automatic means [ISO, as reported by Drug Information Association].
Data availability - the state when data are in the place needed by the user, at
the time the user needs them, and in the form needed by the user [NCSC-TG-
004-88]' the state where information or services that must be accessible on a
timely basis to meet mission requirements or to avoid other types of losses
[OMB]. Data stored electronically require a system to be available in order to
have access to the data. Data availability can be impacted by several factors,
including system "down time," data encryption, password protection, and
system function access restriction.
Data Base Management System (DBMS) - software that allows one or many
persons to create a data base, modify data in the data base, or use data in the
data base (e.g., reports).
C-2

-------
Automated Laboratory Standards Program
Data base - a collection of data having a structured format.
Data confidentiality - the ability to protect the privacy of data; protecting data
from unauthorized disclosure [OMB].
Data element (field) - contains a value with a fixed size and data type (see
below). A list of data elements defines a data base.
Data integrity - ensuring the prevention of information corruption {modified
from EPA Information Security Manual]; ensuring the prevention of
unauthorized modification [modified from OMB]; ensuring that data are
complete, consistent, and without errors.
Data record - consists of a list of values possessing fixed sizes and data types
for each data element in a particular data base.
Data types - alphanumeric (letters, digits, and special characters), numeric
(digits only), boolean (true or false), and specialized data types such as date.
Electronic data integrity - data integrity protected by a computer system;
automated data integrity refers to the goal of complete and incorruptible
computer-resident data.
Encryption - the translation of one character string into another by means of a
cipher, translation table, or algorithm, in order to render the information
contained therein meaningless to anyone who does not possess the decoding
mechanism [Datapro].
Error - accidental mistake caused by human action or computer failure.
Fraud - deliberate human action to cause an inaccuracy.
General controls - one of the two sets or types of controls recognized by the
auditing discipline. These operate across all applications. These would
include developing and staffing a quality assurance program that works
independently of other staff; developing and enforcing documentation
standards; developing standards for data transfer and manipulation, such as
prohibiting the same individual from both performing and approving
sample testing; training individuals to perform data transfers; and developing
hardware controls, such as writing different backup cycles to different disk
packs and developing and enforcing labelling conventions for all cabling.
Integrity - see "data integrity."
G-3

-------
Automated Laboratory Standards Program
Journaling - recording all significant access or file activity events in their
entirety. Using a journal plus earlier copies of a file, it would be possible to
reconstruct the file at any point and identify the ways it has changed over a
specified period of time [Datapro].
Laboratory Information Management System (LIMS) - automation of
laboratory processes under a single unified system. Data collection, data
analysis, and data reporting are a few examples of laboratory processes that
can be automated.
Password - a unique word or string of characters used to authenticate an
identity. A program, computer operator,or user may be required to submit a
password to meet security requirements before gaining access to data. The
password is confidential, as opposed to the user identification [Datapro].
Quality assurance - (1) a process for building quality into a system; (2) the
process of ensuring that the automated data system meets the user
requirements for the system and maintains data integrity; (3) a planned and
systematic pattern of all actions necessary to provide adequate confidence that
the item or product conforms to established technical requirements
[ANSI/IEEE Std 730-1981, as reported by Drug Information Association].
Raw data - . . any laboratory worksheets, records, memoranda, notes, or
exact copies thereof, that are the result of original observations and activities
of a study and are necessary for the reconstruction and evaluation of that
study. . . "Raw data" may include photographs, microfilm or microfiche
copies, computer printouts, magnetic media, . . . and recorded data from
automated instruments." [40 CFR 792.3] Raw data are the first or primary
recordings of observations or results. Transcribed data (e.g., manually keyed
computer-resident data taken from data sheets or notebooks) are not raw data.
Risk - "the probable result of the occurrence of an adverse event..." [Perry].
An "adverse event" could be either accidental (error) or deliberate (fraud).
An example of an adverse event would be the inaccurate assignment of an
accessionary number to a test sample. Risk, then, would be the likelihood
that the results of an analysis would be attributed to the wrong sample.
Risk analysis - a means of measuring and assessing the relative
vulnerabilities and threats to a collection of sensitive data and the people,
systems, and installations involved in storing and processing those data. Its
purpose is to determine how security measures can be effectively applied to
minimize potential loss. Risk analyses may vary from an informal,
quantitative review of a microcomputer installation to a formal, fully
quantified review of a major computer center [EPA IRM Policy Manual].
G-4

-------
Automated Laboratory Standards Program
Security - the protection of computer hardware and software from accidental
or malicious access, use, modification, destruction, or disclosure. Security
also pertains to personnel, data, communications, and the physical protection
of computer installations [Drug Information Association].
System - (1) a collection of people, machines, and methods organized to
accomplish a set of specific functions; (2) an integrated whole that is
composed of diverse, interacting, specialized structures and subfunctions; (3) a
group of subsystems united by some interaction or interdependence,
performing many duties but functioning as a single unit [ANSI N45.2.10,
1973, as reported by Drug Information Association].
System Development Life Cycle (SDLC) - a series of distinct phases through
which development projects progress. An approach to computer system
development that begins with an evaluation of the user needs and
identification of the user requirements and continues through system design,
module design, programming and testing, system integration and testing,
validation, and operation and maintenance, ending only when use of the
system is discontinued [modified from Drug Information Association].
Transaction log - also Keystroke, capture, report, and replay - the technique of
recording and storing keystrokes as entered by the user for subsequent replay
to enable the original sequence to be reproduced exactly [Drug Information
Association],
Valid - having legal strength or force, executed with proper formalities,
incapable of being rightfully overthrown or set aside [Black's Law Dictionary].
Validity - legal sufficiency, in contradistinction to mere regularity (being
steady or uniform in course, practice, or occurrence) [Black's Law Dictionary].
G-5

-------
References
Basden, A., and E.M. Clark (1980), Data Integrity in a General Practice Computer
System (CLINICS), International Journal of Bio-Medical Computing 11:511-519.
Black, Henry C. (1968), Black's Law Dictionary, Revised Fourth Edition (West
Publishing Co., St. Paul, Minnesota).
Clinical Laboratory Improvement Act of 1967 (P.L. 90-174, December 5, 1967).
Clinical Laboratory Improvement Amendments of 1988 (P.L. 100-578,
October 31,1988).
College of American Pathologists (1988), Standards for Laboratory Accreditation
(Commission on Laboratory Accreditation, College of American Pathologists,
Skokie, Illinois).
Datapro Research (1989), Datapro Reports on Information Security (McGraw-Hill,
Inc., Delran, New Jersey).
Department of Transportation (1989), Federal Register, Procedures for
Transportation Workplace Drug Testing Programs; Final rule. Vol. 54, No. 230,
December 1,1989, 49854-84,
Drug Information Association (1988), Computerized Data Systems for Nonclinical
Safety Assessment: Current Concepts and Quality Assurance (Drug Information
Association, Maple Glen, Pennsylvania).
Gardner, Elizabeth (1989a), Computer Dilemma: Clinical Access vs. Confidentiality,
Modern Healthcare (November 3), pp. 32-42.
Gardner, Elizabeth (1989b), Secure Passwords and Audit Trails (Sidebar), Modern
Healthcare (November 3), p. 33.
Gardner, Elizabeth (1989c), System Assigns Passwords, Beeps at Security Breaches
(Sidebar), Modern Healthcare (November 3), p. 34.
Gardner, Elizabeth (1989d), System Opens Access to Physicians, Restricts it to Others
(Sidebar), Modern Healthcare (November 3), p. 38.
Gardner, Elizabeth (1989e), 'Borrowed' Passwords Borrow Trouble (Sidebar), Modern
Healthcare (November 3), p. 42.

-------
Gardner, Elizabeth (19890, Recording Results of AIDS Tests can be a Balancing Act
(Sidebar), Modern Healthcare (November 3), p. 40.
National Bureau of Standards (1976), Glossary for Computer Systems Security (U.S.
Department of Commerce, FIPS PUB 39).
National Computer Security Center (1988), Glossary of Computer Security (U.S.
Department of Defense, NCSC-TG-004-88, Version 1).
Office of Information Resources Management (1987), EPA Information Resources
Management Policy Manual, Chapter 8 (U.S. Environmental Protection Agency,
Washington, D.C.).
Office of Information Resources Management (1989), EPA Information Security
Manual (U.S. Environmental Protection Agency, Washington, D.C., December 15,
1989).
Office of Management and Budget (1988), Guidance for Preparation and Submission
of Security Plans for Federal Computer Systems Containing Sensitive Information,
OMB Bulletin No. 88-16 (Office of Management and Budget, Washington, D.C.,
July 6,1988).
Perry, William E. (1983), Ensuring Data Base Integrity (John Wiley and Sons, New
York).
Romano, Carol. A. (1987), Privacy, Confidentiality, and Security of Computerized
Systems: The Nursing Responsibility, Computers in Nursing (May/June), pp.99-104.
U.S. Department of Health and Human Services (1988), Federal Register, Mandatory
Guidelines for Federal Workplace Drug Testing Programs; Final Guidelines. Vol.
53, No. 69, April 11, 1988, 11969-11989.
U.S. Department of Health and Human Services (1990), Federal Register, Medicare,
Medicaid and CLLA Programs; Final Rule with Comment Period. Vol. 55, No. 50,
March 14,1990, 9537-610.

-------