FDA 21 CFR Part 11 — Electronic Records & Signatures
Trustworthy electronic records and signatures equivalent to handwritten signatures and paper records.
Why this matters: Part 11 sets the bar for using electronic records and signatures in place of paper. It is a layered standard covering audit trails, access controls, system validation, and signature manifestation. HQ Cortex is built closed-system-first, with server-side timestamps, RBAC, and immutable record versioning. The biggest gap today is full electronic signatures with re-authentication at signing — this is the highest-priority compliance work.
This is a core regime in scope for the default product.
Status legend
- SupportedWe can do this today.
- In progressPartially in place or actively in development.
- Not yet plannedNot yet started or not in scope.
Electronic Records
Validated for accuracy and reliability
In progressSystem must be validated to ensure accuracy, reliability, consistent intended performance, and detection of altered records.
In HQ Cortex: Strong engineering controls (strict types, validated inputs, an automated test suite) keep the system reliable. A formal validation pack (URS, risk assessment, IQ/OQ/PQ artifacts) for customers is in development.
21 CFR 11.10(a)
Human-readable and electronic record copies
In progressGenerate accurate, complete copies of records for inspection, in both human-readable and electronic form.
In HQ Cortex: PDF rendering exists for labels and many records, and structured data exports are supported. A unified inspector-mode export bundle (PDF, structured data, and audit trail together) is on the roadmap.
21 CFR 11.10(b)
Protected, ready retrieval throughout retention
In progressRecords must be retrievable and protected for the entire retention period.
In HQ Cortex: Records are stored on managed, replicated database and file-storage services, and soft-delete is the default. Customer-configurable retention policy and tested restore evidence are not yet published.
21 CFR 11.10(c)
Operational checks: enforced sequencing
In progressEnforce the permitted sequencing of steps and events.
In HQ Cortex: Server-side guards enforce the core batch transitions: a batch must be in `planned` to start, `in_progress` to record component usage, and release validates output quantity against committed package lots. Cross-cutting guarantees on QC status routing and a strict block on consuming superseded formulation versions are still being formalized.
21 CFR 11.10(f)
Server-validated input and source
SupportedValidate the source and content of data input or operational instruction.
In HQ Cortex: Every server-side write runs structured input validation, and rate-limit middleware bounds traffic per user.
21 CFR 11.10(h)
Audit Trail
Computer-generated, time-stamped audit trail
In progressSecure, computer-generated, time-stamped trail of create/modify/delete actions on regulated records, with actor and time.
In HQ Cortex: Audit logs cover equipment activity, financial actions, and external notifications today. A unified, all-domain audit trail spanning every regulated entity is being expanded.
21 CFR 11.10(e)
Changes do not obscure prior values
SupportedRecord changes must preserve previously recorded information.
In HQ Cortex: Formulation and procedure versions retain immutable snapshots, and the prior value is always visible from the version history view.
21 CFR 11.10(e)
Audit trail retention parity with records
In progressAudit trail must be retained for at least as long as the underlying record.
In HQ Cortex: Audit logs share retention with their parent records through standard backups. A documented retention policy and customer-visible RPO/RTO is being prepared.
21 CFR 11.10(c), 11.10(e)
Reviewable audit trail per record
Not yet plannedAudit trails subject to GMP must be reviewed; provide tooling to review and acknowledge.
In HQ Cortex: A per-record audit-trail view exists for some domains. A QA review-and-acknowledge workflow on audit trails is planned.
FDA Data Integrity Q&A (2018), Q.7
Electronic Signatures
Signatures unique to one individual
In progressEach electronic signature must be unique to one individual and not reused or reassigned.
In HQ Cortex: Each user has a unique identity through our authentication provider, and user records are retained on deactivation. The full e-signature record binding signer, meaning, record hash, and UTC timestamp is in development.
21 CFR 11.100(a)
Identity verified before signature is sanctioned
In progressOrganization must verify identity before assigning or certifying an e-signature.
In HQ Cortex: Organization admins control invites and role assignment. A documented identity-verification step recorded on the user profile is on the roadmap.
21 CFR 11.100(b)
Two-component signature with re-authentication
Not yet plannedNon-biometric signatures use two distinct components (e.g., user ID + password); the first signing in a session uses both, and signings after timeout require both again.
In HQ Cortex: Not yet implemented. A re-authentication challenge at the moment of each signing event is the most material Part 11 gap.
21 CFR 11.200(a)(1)
Signature manifestation: name, date/time, meaning
Not yet plannedSigned records must display printed name, date/time, and meaning of the signature (review, approval, authorship, responsibility).
In HQ Cortex: Approver/changedBy fields exist but a controlled signature meaning vocabulary and rendered signature block are not yet shipped.
21 CFR 11.50(a)
Cryptographic linkage of signature to record
Not yet plannedSignatures must be linked to records so they cannot be excised, copied, or transferred.
In HQ Cortex: Planned: store a cryptographic hash of the canonical record at sign time, with a verify-signature action that recomputes the hash.
21 CFR 11.70
Access Controls and Authentication
Access limited to authorized individuals
SupportedSystem access must be limited to authorized individuals; deactivated users lose access immediately.
In HQ Cortex: A managed authentication provider handles sign-in for every regulated route, and user profiles support both deactivation and anonymization.
21 CFR 11.10(d)
Authority checks (RBAC)
SupportedAuthority checks ensure only authorized individuals can sign records, alter records, or perform operations.
In HQ Cortex: Resource-level role-based access control is enforced server-side on every regulated action.
21 CFR 11.10(g)
Multi-factor authentication enforced
In progressMFA reduces the chance of unauthorized use and supports detection of compromised credentials.
In HQ Cortex: MFA is supported through our authentication provider. Enforced MFA for all regulated-data accounts is configurable per workspace, and default-on enforcement is planned.
21 CFR 11.300(d) — implementation practice
Session timeout with re-authentication
In progressIdle sessions must end such that signing requires re-authentication.
In HQ Cortex: Session expiry is configurable. The signing-specific re-authentication challenge is part of the e-signature work in flight.
21 CFR 11.10(d), 11.200(a)(1)(ii)
Detection and lockout of unauthorized attempts
In progressDetect unauthorized use; report attempts to security and management.
In HQ Cortex: Rate limiting protects API endpoints. Centralized auth-failure alerting and admin notifications are planned.
21 CFR 11.300(d)
Time and Date Controls
Server-side timestamps only
SupportedAudit trail and signature timestamps must be generated by the server, not user-supplied.
In HQ Cortex: All created and updated timestamps are set by the database itself, and no regulated workflow accepts a client-supplied timestamp.
21 CFR 11.10(e)
Synchronized authoritative time (NTP)
SupportedSystem clock must be synchronized to an authoritative source.
In HQ Cortex: Our hosting and database providers supply NTP-synchronized clocks, and UTC is the canonical storage timezone.
FDA Data Integrity Q&A, Q.10
Data Integrity (ALCOA+)
Attributable — every action linked to a person
SupportedNo shared accounts; every record/audit row carries a user attribution.
In HQ Cortex: Every user has a unique identity, and the acting user is stored on every regulated record and audit row.
ALCOA+; 21 CFR 11.10(e)
Contemporaneous — recorded when the activity occurs
SupportedRecords must be created at the time of the event; back-dating must be flagged.
In HQ Cortex: Server-side timestamps are written when each record is created, and there is no user-supplied 'performed at' override on regulated writes.
ALCOA+; 21 CFR 11.10(e)
Original / Enduring — durable, immutable storage
In progressOriginal records preserved on durable media for the full retention period.
In HQ Cortex: Versioned snapshots are in place. Documented backup, geo-replication, and tested restore evidence is being prepared.
ALCOA+
Complete — no silent data loss
In progressFailed and aborted actions still leave a record; nothing is silently dropped.
In HQ Cortex: Failures on server-side actions are logged. Coverage of failure-path audit logging across every regulated write is being expanded.
ALCOA+
References
Last reviewed: May 2026.