DISTEK Dissolution and Pharmaceutical Test Instruments
DISTEK > Dissolution > Cipher
Cipher Dissolution Control Software
Cipher dissolution control software developed by Distek is a windows based application designed to be provide either local or network to any Distek dissolution instruments on the network. With various and fully customizable levels of security, the software allows the user to bring the instruments within compliance to the match your developed policies. All of which are designed to meet 21 CFR part 11 compliance.
Fully Customizable Access Levels
Allows for a wide range of access levels from system administrator, to customized access roles such as analyst where only methods can be selected or for QC where document viewing and approval is allowed. All of which can be tailored to your local policies. Most of which can be setup through an easy to use tick box system.
Customized System Policies and Reporting
Allows for a range of auditing and customizable report authorization levels from full access to multiple layers of report authorization required before the analysis report can become fully authorized and the results released, with ASCII LIMS compatibility if required. All levels of authorization can be tracked and viewed on the finished analysis report.
Remote System Control
The network capability of Cipher allows for systems to be monitored anywhere on the network that the systems are linked. This allows for the performance of the instruments to be monitored in the safety of an office. The advanced tracking capability of Cipher allows for a wide range of integer time points to be monitored, ensuring that the system remains within USP guidelines throughout the experiment. However, once a Cipher method has started on the instrument. it is not possible to control the instrument locally until completed, except for emergency stop.
Method and Event Audit Trail
The method audit trail is an integral requirement of an electronic record, ensuring the validity and integrity of the record. Cipher records all changes to a method, when it was accessed and by whom. The same applies to the event audit trail. Allowing for auditing of the entire process, even for systems such as the 4300, 6100 and 6300 which did not originally come with such features built in.