What Is Data Integrity in Pharma and Why It Matters?

Data integrity in pharma refers to the completeness, consistency, and accuracy of data throughout its entire lifecycle, from the moment a measurement is recorded on a manufacturing floor or in a lab to the point that record is archived or destroyed. It’s the foundation regulators use to determine whether a drug is safe and was manufactured correctly. If the data behind a product can’t be trusted, the product itself can’t be trusted.

The concept covers every type of record a pharmaceutical company generates: lab test results, batch manufacturing records, equipment calibration logs, stability studies, and the electronic systems that store them. Regulatory agencies worldwide treat data integrity failures as serious violations because unreliable data can mask quality problems that directly affect patient safety.

The ALCOA+ Framework

The pharmaceutical industry organizes data integrity around a set of principles known as ALCOA+, which spells out nine requirements every piece of regulated data must meet:

  • Attributable: Every action can be traced back to a specific individual. If someone recorded a test result, you need to know exactly who.
  • Legible: Data is clear, readable, and understandable, whether it’s a handwritten entry or a digital file.
  • Contemporaneous: Data is recorded in real time, at the moment the activity happens, not hours or days later from memory.
  • Original: Documents must be originals or certified true copies. Rewritten or recreated records don’t count.
  • Accurate: Data reflects exactly what was observed and recorded, with no edits that obscure the original value.
  • Complete: Nothing is omitted. You can’t delete a failed test run and pretend it didn’t happen.
  • Consistent: Documentation follows a logical, chronological order. Timestamps shouldn’t contradict each other.
  • Enduring: Records are maintained for the full retention period specified by regulators, which can be years or even decades.
  • Available: Documents are accessible whenever needed for reference, review, or a regulatory audit.

These nine principles apply equally to paper records and electronic systems. A handwritten lab notebook entry needs to meet the same standards as a result stored in a computerized laboratory system. The “plus” in ALCOA+ refers to the last four criteria (complete, consistent, enduring, available), which were added as electronic records became the norm and introduced new ways data could be compromised.

Why Regulators Take It So Seriously

Every major regulatory body has published specific guidance on data integrity. The FDA’s 21 CFR Part 11 sets the requirements for electronic records and electronic signatures in the U.S. It mandates that companies validate their computer systems to ensure accuracy and reliability, use secure, computer-generated audit trails that record the date and time of every entry or modification, and ensure each electronic signature is unique to one individual and never reused or reassigned.

In Europe, Annex 11 of the EU GMP guidelines takes a lifecycle approach, requiring risk management from the moment a computerized system is designed through its eventual retirement. It specifies that critical data entered manually should be verified by a second operator or by validated electronic means. It also requires that any change or deletion of GMP-relevant data include a documented reason, and that audit trails be regularly reviewed and available in a readable format.

The World Health Organization published its own dedicated guideline on data integrity in 2021 (TRS 1033, Annex 4), reinforcing that these expectations apply globally, not just in the U.S. and Europe. The consistency across agencies means a pharmaceutical company exporting products internationally faces essentially the same data integrity standards everywhere.

The Data Lifecycle

Data integrity isn’t just about the moment a number gets written down. It covers four phases that regulators track closely: data creation, data in transit (being transferred between systems), data during processing (being analyzed or transformed), and data at rest (stored in a database or archive).

In practice, a piece of data might start as a raw sensor reading from manufacturing equipment. That transient signal becomes an official electronic record once it’s captured and saved to a repository. During its active life, it may be analyzed, reported, migrated between systems, or extracted for regulatory submissions. Eventually, records that are no longer active move into long-term storage, where they still need to remain accessible, readable, and intact for as long as regulators require. At every stage, the same integrity controls apply. A record that was perfectly accurate when created but became corrupted during a system migration is still a data integrity failure.

Common Violations

FDA inspection data from fiscal year 2024 reveals that over 50% of all data quality citations related to inadequate procedures. The most frequent problems fall into a few recurring categories.

Missing or unreconstructed records remain a persistent issue. Companies fail to maintain original records, making it impossible to verify what actually happened during manufacturing or testing. Poor attribution is another common finding: when employees share generic login accounts instead of using individual credentials, there’s no way to trace who actually performed a given activity. This directly violates the “attributable” principle of ALCOA+.

Insufficient validation of computerized systems, including cloud and network solutions, was again cited frequently in 2024. Companies deploy software that generates or stores regulated data without adequately proving the system works as intended. Outdated or incomplete system inventories also appear regularly, where companies lose track of which systems hold GMP-relevant data, leading to uncontrolled records that fall outside their quality oversight.

More serious violations involve generating false or misleading data, conducting unofficial “trial” test runs before recording official results, or failing to investigate unexplained discrepancies in test data. These aren’t paperwork errors. They represent deliberate manipulation or willful negligence.

What Happens When Integrity Fails

The consequences are concrete and expensive. When the FDA determines a facility has significant data integrity problems, it issues a Warning Letter, which becomes public record. Drug applications tied to unreliable data receive complete response actions, meaning the FDA refuses to approve them until the company can prove its data is trustworthy. In some cases, companies have been required to manufacture entirely new batches and repeat bioequivalence studies from scratch using the new product, a process that can cost millions and delay market entry by years.

Beyond individual products, a data integrity finding can call into question every product manufactured at a facility. If inspectors discover that a site’s quality systems are fundamentally compromised, the credibility of all data generated there comes under scrutiny. Import alerts can block products from entering the U.S. market entirely, and the reputational damage can affect business relationships with partners and contract manufacturers worldwide.

Audit Trails and Technical Controls

The audit trail is the single most important technical control for data integrity in electronic systems. It’s an automatic, system-generated log that records every action: who created, modified, or deleted a record, and exactly when. Regulatory expectations require that audit trails be protected against unauthorized access, alteration, or deletion. Best practices include using write-once-read-many (WORM) storage, which makes it physically impossible to overwrite historical entries.

Companies are expected to review audit trails periodically, not just during inspections. These reviews should follow documented procedures and look for patterns that might indicate integrity problems: repeated deletions, after-hours modifications, or entries that don’t align with expected workflows. Internal audits serve as a rehearsal for regulatory inspections, catching deficiencies early enough to correct them before they escalate.

Access controls are equally critical. Every user of a GXP system needs a unique account with permissions matched to their role. Electronic signatures must use at least two identification components, typically a user ID and password, and those signatures must be permanently linked to their records so they can’t be copied or transferred to falsify data.

Culture Matters as Much as Technology

No amount of software validation or access controls can compensate for a workplace culture that tolerates shortcuts. Regulatory agencies increasingly evaluate whether a company’s quality culture genuinely supports data integrity or just pays lip service to it. The expectation is that employees at every level understand why accurate, complete records matter, and that management supports quality decisions even when they conflict with production deadlines or business objectives.

In organizations with strong data integrity cultures, employees feel comfortable reporting problems and deviations without fear of blame. Performance evaluations and advancement opportunities reflect quality contributions. Systems and processes are designed to prevent integrity issues in the first place, not just detect them after the fact. When a company treats data integrity as a compliance checkbox rather than a core value, the problems tend to be systemic, showing up across departments and product lines rather than as isolated incidents.

Cloud Systems and Emerging Complexity

As pharmaceutical companies move regulated data into cloud-based platforms, new integrity challenges emerge. Encryption protects data from unauthorized viewing but does nothing to prevent corruption from malware or guarantee that records remain available during outages or disasters. Companies using cloud service providers still bear full responsibility for the integrity of their data and must conduct thorough risk assessments covering threats to confidentiality, integrity, and availability.

Service level agreements with cloud providers should address system reliability, backup and recovery procedures, how data will be returned if the service is terminated, and clear delineation of security responsibilities. The cloud provider’s own internal controls matter too: if a malicious actor gains access to administrative tools that manage storage or network resources, the integrity of every customer’s data could be compromised. Unpatched or obsolete infrastructure at the provider level is a risk pharmaceutical companies need to evaluate and monitor, not assume is handled.