WO2003091834A2 - Procede et systeme de gestion de la securite concernant l'utilisation d'un agent biologique - Google Patents

Procede et systeme de gestion de la securite concernant l'utilisation d'un agent biologique Download PDF

Info

Publication number
WO2003091834A2
WO2003091834A2 PCT/US2002/013980 US0213980W WO03091834A2 WO 2003091834 A2 WO2003091834 A2 WO 2003091834A2 US 0213980 W US0213980 W US 0213980W WO 03091834 A2 WO03091834 A2 WO 03091834A2
Authority
WO
WIPO (PCT)
Prior art keywords
user
proposed
biological agent
author
conditions
Prior art date
Application number
PCT/US2002/013980
Other languages
English (en)
Other versions
WO2003091834A8 (fr
Inventor
Keith Alan Swain
Original Assignee
E. I. Du Pont De Nemours And Company
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by E. I. Du Pont De Nemours And Company filed Critical E. I. Du Pont De Nemours And Company
Priority to JP2004500144A priority Critical patent/JP2005520263A/ja
Priority to US10/476,917 priority patent/US20040133436A1/en
Priority to EP02807311A priority patent/EP1410298A2/fr
Publication of WO2003091834A2 publication Critical patent/WO2003091834A2/fr
Publication of WO2003091834A8 publication Critical patent/WO2003091834A8/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Definitions

  • This invention relates to a computer- implemented method and computing system for the collaborative evaluation and control of the potential safety hazards attendant upon the use of one or more biological agents-
  • Management of safety issues, such as hazard evaluation, is often an ad hoc informal process.
  • the process relies upon the knowledge of a safety professional regarding generalized safety procedure coupled with the knowledge of the experienced researcher regarding specific hazards associated with the material being employed.
  • knowledge of generalized and highly technical safety procedures may not insure that all relevant regulations and standards are made available when dealing with potential biological hazards. Accordingly, the risks inherent to such an informal process are exacerbated when dealing with biological materials .
  • a user-experimenter prepares and submits to an audit agency a listing of parameters regarding a proposed use of a biological agent.
  • the listing includes the identity of a biological agent proposed to be used by a user, the use to which the biological agent is proposed to be put, the medium in which the biological agent proposed use will occur, and the containment system in which the proposed use will be practiced.
  • a decision engine is used by the user and/or the audit agency to determine a hazardous risk classification of the biological agent.
  • the user receives from the audit agency a bio-safety level designation of the use, the bio-safety level designation being based upon the hazardous risk classification.
  • the user submits for review by the audit agency a proposed set of operating procedures and conditions governing the proposed use.
  • the degree of specificity of the information in the list is dependent upon the bio-safety level designation.
  • the audit agency returns to the user comments regarding the informational items submitted.
  • the comments may optionally include modifications to the proposed set of operating procedures and conditions.
  • the submission and return is repeated as necessary until an approval by the audit agency is received.
  • the approval contains a final set of operating procedures and conditions.
  • the user-experimenter practices the use in accordance with final set of operating procedures and conditions.
  • the system of the present invention comprises a server node and at least one user node.
  • the server node has a memory partitioned into two user-accessible sections: a document processing section and an archive or repository section.
  • the document processing section has at least one document contained within it.
  • Documents may be contained within an electronic folder, called a workbook.
  • the workbook contains documents that have been created by a user acting as an author and documents signed by the author that have been electronically forwarded for review by an audit agency.
  • the archive or repository section contains approved workbooks with the associated author-signed and approver-signed documents. Each workbook in the archive is affiliated with one or more users and contains documents that have been created and signed by that user acting as an author and that have been reviewed and approved and signed by the audit agency.
  • Each user node is operable in either an author mode, a review/approval mode, or read-only mode.
  • the author mode When operable in the author mode the user node is connectable to the document within a workbook within the user's work space for storage of an unsigned document and retrieval of a previously-stored unsigned document for editing and/or signing by that user acting as an author.
  • the author-signed document includes a signature string representative of the identity of that user acting as an author, a first date/time stamp provided by the server, and a document edit history.
  • the document may be stored in a workbook of that user in the document processing section of the system memory and is forwarded to one or more reviewers (i.e., the audit agency) designated by the author.
  • the user node When the user node is operable in the review/approval mode the user node is connectable to the system memory for retrieval of a signed document or workbook for review and comment or approval-signing by a user (a member of the audit agency) acting as an approver. Documents that have received comments are forwarded to the author for further revision. Documents that have been approved include the approver signature and a date/time stamp provided by the server node and a document review/edit history string. After the approver has approved the author-signed signed document the user node is connectable to the document processing section for storage of the signed and approved document in a workbook therein. The approver-signed documents may then be forwarded to the archive section.
  • the system administrator may grant readonly access to other users, access by other users to in-progress documents within a workbook, contained in the document processing section, is controlled by the author.
  • the author may designate another user as an "additional author” for a document or for an entire workbook.
  • the author may designate a "reviewer/approver” by selecting from a list of authorized users having "reviewer/approver” authority.
  • a workbook has been designated by the author as "complete” and has been approved by the audit agency, that workbook is transferred to the archive section of the memory.
  • the system administrator has access control for workbooks in the archive section of the memory.
  • Figure 1 is a high-level block diagram of an safety management process for managing the use of a biological agent in accordance with the present invention
  • Figure 2 is a flow diagram showing the hazard evaluation decision engine used in the process of claim 1;
  • Figure 3 is a stylized diagrammatic representation of a computing system for practicing the process of Figure 1;
  • Figure 4 is a flow diagram showing the archive document management process .
  • FIG. 1 is a high level block diagram of an safety management process, generally indicated by reference numeral 10, for managing the use of a biological agent in accordance with the present invention.
  • the safety management process 10 is believed to provided a more formalized and standardized procedure than the ad hoc process available in the art for assessing the safety risks attendant upon the use of a biological agent.
  • the process 10 here described presupposes the existence or the creation of a safety management audit agency that includes one or more safety professionals.
  • the audit agency may take any of a variety of forms, such as a formally trained biological safety officer or a committee formed of safety professional (s) , knowledgeable researcher (s) and management representative (s) who have been delegated authority over safety procedures. If the committee form is used, actions attributable to the agency may be practiced by the full agency or a sub-group thereof.
  • the first step in the formalized process is the creation by the user of a listing of parameters regarding the proposed use of a biological agent. This action is indicated by reference numeral 20.
  • the listing includes the nature and identity of the biological agent proposed to be used by the user, the use to which the biological agent is proposed to be put, the medium in which the proposed use will occur, and the containment system in which the proposed use will be practiced.
  • the listing may further include: a recommended bio-safety level designation for the proposed use, the type of user(s) (e.g., researcher, technician or operator) ; the level of training of the user(s) (e.g., formal academic training or specific training in safety procedure) ; regulations to be followed for the biological agent; and the level of medical assessment and observation required for the user of the biological agent .
  • a recommended bio-safety level designation for the proposed use the type of user(s) (e.g., researcher, technician or operator) ; the level of training of the user(s) (e.g., formal academic training or specific training in safety procedure) ; regulations to be followed for the biological agent; and the level of medical assessment and observation required for the user of the biological agent .
  • the user forwards the parameter listing to the audit agency for a preliminary review as indicated by block 25.
  • the primary purpose for this preliminary review is to ascertain that the parameter listing conforms to the appropriate regulations and standards.
  • a decision engine is used to implement a decision analysis that determines a hazardous risk classification of the biological agent. This action is indicated at block 35.
  • the decision analysis is discussed in connection with Figure 2.
  • a bio-safety level designation for the proposed use is assigned by the audit agency and returned to the proposed user. This action is indicated in the block 40.
  • the bio-safety level designation is a measure of the containment required for work with the particular biological agent under consideration.
  • the bio-safety level designation returned to the proposed user is indicated by reference numeral 40.
  • the proposed user creates a document containing a description of the detailed operating procedures and conditions governing the proposed use. This description may also include description of the equipment to be used to carry out the proposed use .
  • This document is contained within an electronic folder termed a "workbook" .
  • the document in the workbook is more detailed than the listing of the parameters created in connection with step 20.
  • the degree of specificity of the information in the document is dependent upon the bio-safety level designation.
  • the workbook is submitted by the proposed user to the audit agency for review and approval, as indicated by reference numeral 50.
  • the workbook is reviewed by the audit agency for the appropriateness and adequacy of the proposed operating procedures and conditions in view of the hazardous risk classification and bio- safety level designation.
  • the audit agency decides whether or not to approve the items in the workbook, as indicated at decision block 55. If the audit agency withholds its approval comments are returned to the proposed user, as indicated by reference numeral 60.
  • the comments may optionally include proposed modifications to the set of proposed operating procedures and conditions.
  • Steps 50, 55 and 60 are iterated as needed until an approval containing a final set of operating procedures and conditions is granted by the audit agency.
  • the final set of approved operating procedures and conditions is provided to the proposed user, as indicated by the block designated by reference numeral 65.
  • the approved operating procedures and conditions are also archived in a repository.
  • the user practices the use in accordance with the final set of operating procedures and conditions, as indicated by the block 70.
  • the process of the present invention can accommodate changes .
  • a proposed change in biological agent serves to revoke automatically the approval by the audit agency. Prior to any change in the biological agent the entire process (that is, the steps in the blocks 20 through 70) must be repeated. If the biological agent remains the same, prior to implementing any newly-proposed change in operating procedures and conditions, the steps in blocks 45 through 70 must be repeated.
  • the decision engine that implements the decision analysis uses criteria contained within a reference library 148 ( Figure 3) to determine if the biological agent is a hazard to the environment, to animals, or to humans.
  • a human hazard i.e., a risk of a biological effect to a human
  • an identification of the mode of entry of the agent into the human organism is made. Whether the biological agent will produce a biological effect upon skin contact (including percutaneous entry) , upon contact with a mucus membrane, upon contact with the eye membrane, through inhalation or through ingestion, is determined, as respectively indicated by reference numeral 82, 84, 86, 88 and 90.
  • the identification of the mode of entry may be made in any sequence .
  • each mode of entry identified the severity of the biological effect of the agent on a human is identified.
  • the identifications of severity for each mode of entry is indicated in respective associated blocks 83, 85, 87, 89 and 91.
  • a hazardous risk classification is assigned to the biological agent, as indicated by reference numeral 92.
  • Decision criteria within the reference library 148 is derived from information which has been extracted from recognized safety references and standards, in addition to locally generated safety methods and hazard knowledge. The decision criteria is typically collected in tabular form and is referenced by the decision engine software module 168 ( Figure 3) .
  • FIG. 3 shows a stylized diagrammatic representation of the architecture of a safety management computing system 110 in accordance with of the present invention.
  • the system 110 comprises a server node 120 and, at least one, but more preferably, a plurality of user nodes 124A through 124N.
  • each user node 124 is operable in either an "author mode" by a user, in a “review/approval mode” by an audit agency, or in a "read-only” mode by another user.
  • the term "user node” denotes a hardware location at which an individual user may interact with the system 110.
  • the number N of user nodes is not necessarily the same as the number of individual users of the system.
  • the server node 120 comprises one or more processors, random access memory, and one or more storage devices.
  • a preferred arrangement for the server node comprises a Compaq "Proliant 6500" with four Pentium Pro processors running under Microsoft's NT 4.0 Service Pack 6a operating system and Lotus Development Corporation server software sold as Notes Domino Server 4.5.7.
  • the server comprises four two- hundred megaHertz (200 MHz) processors, one gigabyte of random access memory (RAM), and seven internal 18.2 gigabyte disk drives in a RAID5 configuration.
  • the user nodes 124 are typically implemented using a personal computer, such as a PC-compatible running
  • the user nodes are connected to che server node 120 using a standard networking configuration 128, such as an Ethernet network connection, having Transfer Control Protocol (TCP) with internet protocol (IP) , a combination known as TCP/IP.
  • TCP Transfer Control Protocol
  • IP internet protocol
  • the server node 120 includes a memory 130 that is partitioned to define a user-accessible document processing section 132 and a delete-protected repository, or document archive, section 134.
  • the memory 130 can be implemented using any suitable storage medium, typically a combination of random access semiconductor memory and a magnetic or optical memory.
  • In-progress documents 142 Project work being generated by each user is recorded in "in-progress" documents 142 stored in a user workspace 140 of the document processing section 132.
  • In-progress documents 142 may be stored within a workbook 142W in the user workspace 140.
  • a user acting as an author has the authority to grant access to his/her in-progress documents 142.
  • Documents 144 that have been signed by the author and submitted for review but not yet reviewed by the audit agency continue to reside in the user workspace 140 of the document processing section 132.
  • the repository section 134 is partitioned to define at least one, but more preferably, a plurality of group libraries 136A through 136T.
  • Each group library 136 is dedicated to a single collaborative group of one or more individual users .
  • Each group library 136 contains approved review workbook (s) 138A through 138N.
  • Each workbook 138 may contain one or more approved documents 146 (i.e., documents that have been reviewed and approved by the audit agency) .
  • One or more of the workbook (s) 138 in each group library 136 is (are) assigned to and affiliated with each user forming part of the group. It should be understood that the number of documents 146 in each workbook 138 stored in each group library 136 may be different.
  • all user nodes 124 typically have at least read-only access to all documents and workbooks within the group libraries 136.
  • a reference and resources library 148 provides users access to copies of selected standards and regulations that are stored in the system 110.
  • the library 148 also contains intranet and/or internet links whereby the user may be connected to resources external to the system 110 containing other regulations and standards. Information in the library 148 may be incorporated by an author into in-progress documents
  • intranet and internet links in the library may be incorporated into in-progress documents 142 or author-signed documents 144 and audit agency- approved documents 146 for informational purposes.
  • the library 148 may also provide the mode of entry ( Figure 2, blocks 82, 84, 86, 88, 90) and the severity criteria ( Figure 2, blocks 83, 85, 87, 89, 91) for the decision analysis of biological agents being evaluated.
  • a control program 150 that effects the overall operation of system 110 resides in the memory 130.
  • the control program 150 may be implemented in any suitable software application and operating system environment.
  • One software application suitable to implement the control program 150 is that program sold by Lotus Development Corporation as Notes Domino Server Version 4.5.7 or later.
  • the control program 150 includes a control module 152 that serves to organize the described arrangement of memory 130, to implement an interface 154 between the server node 120 and the user nodes 124, to implement an interface 156 between user nodes 124 and an external network, and to perform other functions in connection with the operation of the system 110.
  • the control program 150 also includes a database administration module 158 to permit access to users to the system 110 in defined roles: author, reviewer/approver, or reader (i.e., read-access only).
  • the administration module 158 also manages the information presented in the database "Help" documents 160 and a system address book 162.
  • the control module 152 also includes a software module 168 to implement the decision engine for the hazardous risk classification.
  • the decision engine uses criteria contained within the reference and resources library 148, as has been more fully described in conjunction with Figure 2.
  • the control program 150 also implements a document library search module 151, which provides users a keyword search capability of documents within the user- accessible section 132 and the repository section 134. Documents 142, 144, 146 (or portions thereof) can be accessed and copied into in-progress documents 142.
  • the server node 120 also includes a clock 170 from which date/time stamps may be derived. The clock 170 may be accessed by a system administrator, but is inaccessible to a user.
  • the listing of parameters regarding the proposed use of a biological agent ( Figure 1, block 20) is created by a user acting as an author in the user workspace 140 as a preliminary listing of parameters document 142.
  • the author signs the document .
  • An author signature string and a date/time stamp is entered into the document 142 by the server 120 to create a author-signed listing of parameters document 144.
  • the author sends the listing of parameters document 144 to the audit agency, typically using an electronic mail message with an attached document link.
  • a single member of the audi-t agency, the so-called bio-safety officer may review and comment on or approve the listing of parameters document 144 ( Figure 1, block 25) .
  • single member may forward the document to other members of the audit agency using an electronic mail message with an attached document link.
  • comments are made by other members of the audit agency, they are forwarded to the bio-safety officer, who collects the comments and forwards them to the author ( Figure 1, arrow 30) .
  • At least one approval signature string and server-generated date/time stamp is appended to the document 144 to create an approved document 146 and an electronic mail message with an attached document link is returned to the author.
  • a copy of the approved document 146 may be archived in the repository 134.
  • the approved list of parameters is used by the decision engine software module 158 t'o determine a hazardous risk classification (Figure 1, block 35), as more fully described in conjunction with Figure 2.
  • the hazardous risk classification is returned to the author ( Figure 1, block 40) .
  • the author uses the approved listing of parameters document 146 and the hazardous risk classification as a starting point, the author creates and edits one or more hazard review documents 142 ( Figure 1, block 45) and provides informational items concerning the proposed procedures and conditions.
  • the informational items are prompted by providing the author with a list of informational requirements.
  • the specificity of informational requirements is selected in accordance with the bio- safety level designation.
  • the informational items may include a description of the equipment to be used to carry out a proposed procedure, a description of the steps of the procedure to be performed and specific conditions to be maintained.
  • a collection of predetermined document formats stored in the reference library 148 is provided to assist the author: a Standard Operating Procedure (SOP) format, an Equipment Safety Audit (ESA) and related Potential Physical Hazards (PPH) documents, a Mini- Hazard Review (MHR) document (for lower-risk hazards) , a Research Safety Review (RSR) (for moderate-risk hazards) , and a Process Hazards Review (PSR) (for higher-risk hazards) .
  • SOP Standard Operating Procedure
  • ESA Equipment Safety Audit
  • PPH Physical Hazards
  • MHR Mini- Hazard Review
  • RSR Research Safety Review
  • PSR Process Hazards Review
  • the author selects the appropriate format or formats and records applicable information about the proposed procedure in the selected formats within the hazard review document.
  • the author may forward completed and signed hazard review documents 144 either individually or as a group to the audit agency.
  • the author signs the document (s) ( Figure 1, block 50).
  • the system appends a date/time stamp and sends the now-signed document (s)
  • the members of the audit agency review the document (s) for appropriate content and either comment or indicate approval (Figure 1, block 55). Reviewers append comments to an electronic mail message linked to the document (s) and return it to the author for further revision ( Figure 1, block 60) or approve the document (s) with their signature/date/time stamp ( Figure 1, block 65) .
  • the system sends an electronic mail with the document link to the author informing the author of the comments of the audit agency or the approval of the document (s) .
  • the author may create additional documents as required for hazard management documentation. These documents may be based upon the formats stored in the reference library 148, as discussed above. Field Survey
  • the author collates these documents into a "review workbook”, to prepare the collated review workbook for a complete review by the audit agency.
  • the act of collating the documents into a review workbook permits further editing of the documents.
  • the author signs and sends the collated review workbook 144 to the audit agency for review. This is again carried out by electronic mail with a document link.
  • the reviewers can send comments about the document content to the author via electronic mail with a document link.
  • the author and selected members of the audit agency conduct a field survey of the equipment, facilities and approved procedures that had been recorded in the review workbook. Based upon this field survey, the author may further edit one or more documents to incorporate the findings of the field survey and prepare that document for further review by the audit agency.
  • the author collates the reviewed document (s) into the review workbook, to prepare the collated review workbook for a complete review by the audit agency.
  • the author signs and sends the collated review workbook 144 to the audit agency for final review and approval. This is again carried out by electronic mail with a document link.
  • the reviewers send their approval of the review workbook content to the author via electronic mail with a document link.
  • the approved review workbook 146 is archived as an archived workbook 138 within the designated library 136 within the repository 134.
  • a history of the biological agent parameters, hazardous risk classification, audit ⁇ agency comments and approvals, operating procedures and conditions and audit agency comments and approvals thereof is also maintained in the system archive.
  • a document management procedure, called the Review/Retention Process, is carried out for all archived documents. This procedure is more fully illustrated in Figure 4.
  • a review date is entered into a field entitled "tim_Archive" within the workbook 138. This is accomplished by adding the "Archive Review Interval" value to the current date and storing the sum in the tim_Archive field.
  • archived workbooks are identified by a software "agent" and a workbook is selected (block 201) .
  • the software agent determines whether the required "Archive Review Interval" for the selected workbook, typically two years, has elapsed. This is determined by comparing today's date to the value in the tim_Archive field. If the Archive Review Interval has not elapsed the ' next workbook is selected (block 204) . If the Archive Review Interval has elapsed then the system control module 152 verifies whether the author still has a mail address in the system address book 157 (block 206) .
  • SA system administrator
  • a document link is included in the electronic mail to enable the system administrator to access the workbook and assign a new author (block 208) .
  • the author does have a mail address in the system address book 157 then the author is notified by electronic mail that the workbook status is to be reviewed (block 210) .
  • the author is required to make a decision, and is presented with two options, "Retain” or "Discontinue” . Only two decision buttons are provided to the author to select, since the author does not have authority to delete workbooks.
  • the author selects the Retain button, the workbook is retained in the Archive and the tim_Archive field in the workbook is reset by adding the "Archive Review Interval" to the current date. Upon the occurrence of the new review date the author will again receive an electronic mail for the same decision. In the event the author no longer available in the system address book 157 the system administrator will be notified to assign a new author.
  • the activity related to the workbook is no longer active, yet there is a need to keep the workbook in the archive, the author selects the Discontinue button. The two-year author review cycle is stopped and a "Discontinue Review" date is set by adding the "Discontinue Review Interval" (typically three years) to the date when the Discontinue decision was made in a separate field within the workbook.
  • the system administrator will receive an electronic mail message with a document link designating the workbook to be deleted.
  • the system administrator reviews the discontinued workbook marked Discontinue Review and has the authority to either delete the workbook (block 224) or to retain the workbook and review it again after the expiration of another "Discontinue Review Interval" (block 226) .
  • the new workbook is marked "Supercedes ###" where ### is the number of the old workbook. All of the tex /data of the superceded workbook is imported into the new workbook, except the approvals. New documents and documents in a new workbook would have to be completed and signed by the author and submitted for approval by the audit agency.

Abstract

L'invention concerne un procédé mis en oeuvre sur ordinateur et un système informatique, permettant l'évaluation et la gestion collectives des risques d'accident potentiels afférents à l'utilisation d'un ou de plusieurs agents biologiques.
PCT/US2002/013980 2001-05-11 2002-05-02 Procede et systeme de gestion de la securite concernant l'utilisation d'un agent biologique WO2003091834A2 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2004500144A JP2005520263A (ja) 2001-05-11 2002-05-02 生物剤を使用するための安全管理方法およびシステム
US10/476,917 US20040133436A1 (en) 2002-05-02 2002-05-02 Safety management method and system for using biological agent
EP02807311A EP1410298A2 (fr) 2001-05-11 2002-05-02 Procede et systeme de gestion de la securite concernant l'utilisation d'un agent biologique

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US29029501P 2001-05-11 2001-05-11
US60/290,295 2001-05-11

Publications (2)

Publication Number Publication Date
WO2003091834A2 true WO2003091834A2 (fr) 2003-11-06
WO2003091834A8 WO2003091834A8 (fr) 2004-02-19

Family

ID=29270369

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/013980 WO2003091834A2 (fr) 2001-05-11 2002-05-02 Procede et systeme de gestion de la securite concernant l'utilisation d'un agent biologique

Country Status (3)

Country Link
EP (1) EP1410298A2 (fr)
JP (1) JP2005520263A (fr)
WO (1) WO2003091834A2 (fr)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2567329A2 (fr) * 2010-05-04 2013-03-13 Docusign, Inc. Systèmes et procédés destinés à des documents avec signature électronique distribués comprenant un contrôle de version
CN105324044A (zh) * 2014-01-14 2016-02-10 深圳市杰仕博科技有限公司 一种电子雾化装置
US9628462B2 (en) 2011-07-14 2017-04-18 Docusign, Inc. Online signature identity and verification in community
US9634975B2 (en) 2007-07-18 2017-04-25 Docusign, Inc. Systems and methods for distributed electronic signature documents
US9824198B2 (en) 2011-07-14 2017-11-21 Docusign, Inc. System and method for identity and reputation score based on transaction history
US9893895B2 (en) 2012-03-22 2018-02-13 Docusign, Inc. System and method for rules-based control of custody of electronic signature transactions
US9971754B2 (en) 2011-07-14 2018-05-15 Docusign, Inc. Method for associating third party content with online document signing
US10033533B2 (en) 2011-08-25 2018-07-24 Docusign, Inc. Mobile solution for signing and retaining third-party documents
US10198418B2 (en) 2007-07-18 2019-02-05 Docusign, Inc. Systems and methods for distributed electronic signature documents
US10511732B2 (en) 2011-08-25 2019-12-17 Docusign, Inc. Mobile solution for importing and signing third-party electronic signature documents

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9514117B2 (en) 2007-02-28 2016-12-06 Docusign, Inc. System and method for document tagging templates
JP5956432B2 (ja) 2010-06-11 2016-07-27 ドキュサイン,インク. ウェブベースの電子署名文書

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH01195568A (ja) * 1988-01-29 1989-08-07 Hitachi Ltd 電子化文書編集制御方式
JPH0855156A (ja) * 1994-07-12 1996-02-27 Internatl Business Mach Corp <Ibm> 工程安全管理のためのコンピュータ・システムおよび方法

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
No Search *
See also references of EP1410298A2 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10198418B2 (en) 2007-07-18 2019-02-05 Docusign, Inc. Systems and methods for distributed electronic signature documents
US9634975B2 (en) 2007-07-18 2017-04-25 Docusign, Inc. Systems and methods for distributed electronic signature documents
US9798710B2 (en) 2010-05-04 2017-10-24 Docusign, Inc. Systems and methods for distributed electronic signature documents including version control
CN103098047A (zh) * 2010-05-04 2013-05-08 多塞股份公司 用于包括版本控制的分发的电子签名文档的系统和方法
EP2567329A4 (fr) * 2010-05-04 2014-04-09 Docusign Inc Systèmes et procédés destinés à des documents avec signature électronique distribués comprenant un contrôle de version
US9251131B2 (en) 2010-05-04 2016-02-02 Docusign, Inc. Systems and methods for distributed electronic signature documents including version control
CN103098047B (zh) * 2010-05-04 2017-02-15 多塞股份公司 用于包括版本控制的分发的电子签名文档的系统和方法
EP2567329A2 (fr) * 2010-05-04 2013-03-13 Docusign, Inc. Systèmes et procédés destinés à des documents avec signature électronique distribués comprenant un contrôle de version
US9628462B2 (en) 2011-07-14 2017-04-18 Docusign, Inc. Online signature identity and verification in community
US9824198B2 (en) 2011-07-14 2017-11-21 Docusign, Inc. System and method for identity and reputation score based on transaction history
US11263299B2 (en) 2011-07-14 2022-03-01 Docusign, Inc. System and method for identity and reputation score based on transaction history
US9971754B2 (en) 2011-07-14 2018-05-15 Docusign, Inc. Method for associating third party content with online document signing
US11055387B2 (en) 2011-07-14 2021-07-06 Docusign, Inc. System and method for identity and reputation score based on transaction history
US11790061B2 (en) 2011-07-14 2023-10-17 Docusign, Inc. System and method for identity and reputation score based on transaction history
US10430570B2 (en) 2011-07-14 2019-10-01 Docusign, Inc. System and method for identity and reputation score based on transaction history
US10511732B2 (en) 2011-08-25 2019-12-17 Docusign, Inc. Mobile solution for importing and signing third-party electronic signature documents
US10033533B2 (en) 2011-08-25 2018-07-24 Docusign, Inc. Mobile solution for signing and retaining third-party documents
US9893895B2 (en) 2012-03-22 2018-02-13 Docusign, Inc. System and method for rules-based control of custody of electronic signature transactions
USRE49119E1 (en) 2012-03-22 2022-06-28 Docusign, Inc. System and method for rules-based control of custody of electronic signature transactions
CN105324044A (zh) * 2014-01-14 2016-02-10 深圳市杰仕博科技有限公司 一种电子雾化装置

Also Published As

Publication number Publication date
EP1410298A2 (fr) 2004-04-21
JP2005520263A (ja) 2005-07-07
WO2003091834A8 (fr) 2004-02-19

Similar Documents

Publication Publication Date Title
Campbell et al. Phase II evaluation of clinical coding schemes: completeness, taxonomy, mapping, definitions, and clarity
US7669114B2 (en) Software architecture and system for performing validated clinical studies of pharmaceutical related products
US20050065823A1 (en) Method and apparatus for privacy checking
JP2004145853A (ja) ヘルスケア外来診療関連情報を監視するためのシステム
Henry Nursing informatics: state of the science
US20090138287A1 (en) System and method for assigning, recording and monitoring MS-DRG codes in a patient treatment facility
Pacheco et al. A proposed model for reuse of software requirements in requirements catalog
WO2003091834A2 (fr) Procede et systeme de gestion de la securite concernant l&#39;utilisation d&#39;un agent biologique
Linhart et al. Carcinogenesis bioassay data system
Amaral et al. Nlp-based automated compliance checking of data processing agreements against gdpr
Prayudi et al. Digital Forensics Workflow as A Mapping Model for People, Evidence, and Process in Digital Investigation
Manz Medical device quality management systems: strategy and techniques for improving efficiency and effectiveness
Sleimi et al. Automated recommendation of templates for legal requirements
Hasman et al. Quality of health care: informatics foundations
US20040133436A1 (en) Safety management method and system for using biological agent
Winget et al. A web-based system for managing and co-ordinating multiple multisite studies
Weinberg Cost-contained regulatory compliance: for the pharmaceutical, biologics, and medical device industries
Sundberg et al. A data-capture tool for mouse pathology phenotyping
Reddy et al. Integral elements of a research protocol
North Ensuring good statistical practice in clinical research: guidelines for standard operating procedures (an update)
Humphrey File maintenance of MeSH headings in MEDLINE
Ivey et al. Managing, Sharing, and Publishing Data
Johnson et al. The Ethics of Data Archiving
TARIGAN et al. ANALYSIS OF NURSING AUDIT IMPLEMENTATION ON QUALITY OF CARE SUBCOMMITTEE IN A HOSPITAL AT JAKARTA
Gehrmann et al. Designing a data access and integration workflow for medical data science: a use case of compiling a reusable data set for primary tumor discovery at MeDIC Cologne

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 10476917

Country of ref document: US

AK Designated states

Kind code of ref document: A2

Designated state(s): JP US

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR

WWE Wipo information: entry into national phase

Ref document number: 2004500144

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 2002807311

Country of ref document: EP

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
D17 Declaration under article 17(2)a
WWP Wipo information: published in national office

Ref document number: 2002807311

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 2002807311

Country of ref document: EP