Skip to main content
QMSQMS
QMS
  • Welcome to your QMS
  • Quality Manual
  • Procedures
  • Records
  • Legit.Health Plus Version 1.1.0.0
    • Index
    • Overview and Device Description
    • Information provided by the Manufacturer
    • Design and Manufacturing Information
    • GSPR
    • Benefit-Risk Analysis and Risk Management
    • Product Verification and Validation
      • Software
        • R-TF-012-023 Software Development Plan
        • R-TF-012-033 Software Test Plan
        • R-TF-012-034 — Software Test Description
        • R-TF-012-035 Software Test Report
        • R-TF-012-038 Verified Version Release
        • EN 62304 Checklist
        • EN 82304 Checklist
      • Artificial Intelligence
      • Cybersecurity
      • Usability and Human Factors Engineering
      • Clinical
      • Commissioning
    • Post-Market Surveillance
  • Legit.Health Plus Version 1.1.0.1
  • Legit.Health Utilities
  • Licenses and accreditations
  • Applicable Standards and Regulations
  • Pricing
  • Public tenders
  • Legit.Health Plus Version 1.1.0.0
  • Product Verification and Validation
  • Software
  • EN 62304 Checklist

EN 62304 Checklist

This checklist provides a comprehensive review of compliance with the EN ISO 62304:2006/A1:2015 standard for medical device software lifecycle processes. The checklist is structured according to the major clauses of the standard and should be completed as part of the quality management system documentation for the device.

Document Information​

FieldValue
Product NameLegit.Health Plus
Version1.1.0.0

Software Safety Classification​

Software safety classification

According to IEC 62304, the device can be classified as a Class B medical device. As such, not all the items of the checklist are required. When an item is required, it will be noted in the column Required of the following table.

Primary Lifecycle Processes​

General Requirements​

ReferenceSoftware Lifecycle ProcessRequiredFulfilledEvidence/Comments
4.1Quality Management SystemTRUE☑Quality management system is established and documented according to UNE-EN ISO 13485:2018. QMS procedures applicable to software development are documented in GP-012 Design, redesign and development.
4.2Risk Management ProcessTRUE☑Risk management process is established according to UNE-EN ISO 14971:2020 and documented in GP-013 Risk management. Software-specific risks are documented in R-TF-013-002 Risk management record and R-TF-013-003 Risk management report.
4.3Software safety classificationTRUE☑Software is classified as Class B according to IEC 62304. Classification is documented in R-TF-012-023 Software Development Plan section "Software safety classification".
4.4Legacy softwareTRUE☑SOUP (Software of Unknown Provenance) components are identified and documented in R-TF-012-029 Software Architecture Description section on SOUP components. Requirements for SOUP are specified in software architecture documentation and managed according to GP-012 and GP-023 change control procedures.

Software Development Process​

Software development planning​

ReferenceSoftware Lifecycle ProcessRequiredFulfilledEvidence/Comments
5.1.1Plan software development processTRUE☑Software development process is planned and documented in GP-012 and R-TF-012-023 Software Development Plan. Five-phase development methodology (Product Design, Software Design, Agile Development, Verification, Validation) is specified.
5.1.2Keep plan currentTRUE☑Software development plan is maintained current through GP-023 Change control management process. Updates are recorded in Git version control system
5.1.3Document software development planTRUE☑Software development plan documented in R-TF-012-023 including organization, roles, planning approach, project roadmap, milestones, development activities, deliverables, and responsibilities.
5.1.4Software development standards, methods and tools planningTRUE☑Development standards (Python coding standards, documentation standards), methods (phase-gate approach, agile sprints), and tools (Git, Python, testing frameworks) are documented in R-TF-012-023 Software Development Plan and GP-012.
5.1.5Software integration and integration testingTRUE☑Integration strategy documented in R-TF-012-023 Phase 3 "Agile and Iterative Development" and Phase 4 "Software Verification". Integration test plans documented in test-plans directory.
5.1.6Software verification planningTRUE☑Verification activities (unit testing, integration testing, system testing) planned in R-TF-012-023 Phase 4. Test protocols and results documented in test-plans and test-runs directories.
5.1.7Software risk management planningTRUE☑Risk management activities documented in R-TF-013-001 Risk management plan according to GP-013 and UNE-EN ISO 14971:2020. Software risks tracked in R-TF-013-002.
5.1.8Documentation planningTRUE☑Documentation requirements documented in R-TF-012-023 including specifications, design documents, test protocols, IFU. Documentation structure established with organized directories for all documentation types.
5.1.9Software configuration management planningTRUE☑Configuration management documented in GP-023 Change control management. Git version control system used throughout project with branching strategy and release management. Traceability maintained through Git commits and tags.
5.1.10Supporting items to be controlledTRUE☑SOUP components documented in SOUP directory. Development tools, libraries, and dependencies tracked. GP-029 API Verification and Validation Plan addresses software validation and external software control.
5.1.11Software configuration item control before verificationTRUE☑Configuration items controlled through Git version control before verification. Change control process (GP-023) ensures baseline establishment. Test execution requires specific version identification. Evidence in Git repository structure and change control procedures.
5.1.12Identification and avoidance of common software defectsTRUE☑Code review processes, Python coding standards, automated testing (pytest), and static analysis implemented. Development practices documented in GP-012 and R-TF-012-023. Test coverage tracked in test execution records.

Software requirements analysis​

ReferenceSoftware Lifecycle ProcessRequiredFulfilledEvidence/Comments
5.2.1Define and document software requirements from system requirementsTRUE☑Software requirements derived from system requirements documented in R-TF-012-029 Software Architecture Description and description-and-specifications.mdx. Requirements traceable to product requirements documented in R-TF-012-023.
5.2.2Content of the software requirementsTRUE☑Software requirements include functional requirements, performance requirements, API interface requirements (REST API, FHIR compliance), safety requirements, and security requirements. Documented with sufficient detail in R-TF-012-029 Software Architecture Description and description-and-specifications.mdx with technical specifications.
5.2.3Integration of risk control measures into software requirementsTRUE☑Risk control measures from R-TF-013-002 Risk management record integrated into software requirements. Risk-software requirements traceability maintained in risk management documentation. Software requirements explicitly address identified hazards and risk mitigation strategies.
5.2.4Re-evaluation of the risk analysis of the medical deviceTRUE☑Risk analysis re-evaluated when software requirements change through GP-013 Risk management process. Changes tracked in R-TF-013-002 with version history. Change control process (GP-023) requires risk impact assessment for all requirement changes.
5.2.5Update of system requirementsTRUE☑System requirements updated when software requirements impact system level through GP-023 Change control management. Bidirectional traceability maintained between system and software requirements. Change history tracked in Git repository and documented in change control records.
5.2.6Verification of the software requirementsTRUE☑Software requirements verified through requirements reviews documented in design reviews per GP-012. Verification confirms completeness, consistency, correctness, testability, and traceability. Test cases in R-TF-012-038 Verified Version Release map to requirements demonstrating testability and verification.

Software architectural design​

ReferenceSoftware Lifecycle ProcessRequiredFulfilledEvidence/Comments
5.3.1Transform software requirements into an architectureTRUE☑Software architecture documented in R-TF-012-029 Software Architecture Description with API design, component architecture (HTTP API, Processors, Orchestrator, Report builder), AI model architecture. Architecture fulfills requirements. Also documented in description-and-specifications.mdx and R-TF-012-030 STED.
5.3.2Develop an architecture for the interfacesTRUE☑Interface architecture documented with REST API design, FHIR compliance, OpenAPI specifications in R-TF-012-029 Software Architecture Description. Interface specifications include endpoints, data formats (JSON), HTTP protocols, authentication. Also documented in description-and-specifications.mdx section "Technical features" and verified in R-TF-012-038.
5.3.3Specify functional and performance requirements for SOUPTRUE☑SOUP components documented in R-TF-012-029 Software Architecture Description with functional and performance requirements. Requirements ensure SOUP components meet device safety and performance needs. Software Bill of Materials (SBOM) maintained in R-TF-030-001.
5.3.4Specify hardware and software required for SOUPTRUE☑Hardware and software requirements for SOUP documented in R-TF-001-006 IFU technical specifications and R-TF-012-029 Software Architecture Description. Python runtime environment, operating systems, hardware specifications for AI model execution defined. SBOM in R-TF-030-001.
5.3.5Identify segregation necessary for risk controlFALSEN/ANot required for Class B software. However, modular design implemented with clear component separation (API, Processors, Orchestrator, Report builder) as documented in architecture documentation. Component segregation follows software engineering best practices.
5.3.6Verify software architectureTRUE☑Architecture verified through design reviews documented per GP-012 Design process. Reviews verify architecture fulfills requirements, implements risk controls, follows design standards. Architecture review and verification documented in R-TF-012-038 Verified Version Release.

Software detailed design​

ReferenceSoftware Lifecycle ProcessRequiredFulfilledEvidence/Comments
5.4.1Subdivide software into software unitsTRUE☑Software subdivided into modules (HTTP API, Processors, Orchestrator, Report builder) and classes/functions with defined interfaces. Component structure documented in R-TF-012-029 Software Architecture Description and STED "Key materials" section. Python modules organized with clear responsibilities.
5.4.2Develop detailed design for each software unitFALSEN/ANot required for Class B software. Code structure, algorithms, and implementation details documented through inline code documentation, API specifications (OpenAPI), and technical documentation in description-and-specifications.
5.4.3Develop detailed design for interfacesFALSEN/ANot required for Class B software. Interface design documented at architectural level through REST API specifications, FHIR data models, OpenAPI specifications in R-TF-012-029 Software Architecture Description. API documentation and communication protocols documented in description-and-specifications.mdx "Technical features" section.
5.4.4Verify detailed designFALSEN/ANot required for Class B software. Design verification performed through code reviews, automated testing (pytest), and system testing documented in R-TF-012-038 Verified Version Release. Test execution results demonstrate verification.

Software unit implementation and verification​

ReferenceSoftware Lifecycle ProcessRequiredFulfilledEvidence/Comments
5.5.1Implement each software unitTRUE☑Software units implemented in Python following coding standards. Source code managed in Git repository () with version control, code reviews, and comprehensive documentation. Implementation follows requirements and design specifications.
5.5.2Establish software unit verification processTRUE☑Unit verification process includes pytest unit testing, code reviews, and automated testing. Process established in GP-012 and R-TF-012-023. Test framework implemented throughout project. procedures and development plan documentation.
5.5.3Document software unit acceptance criteriaTRUE☑Acceptance criteria defined in R-TF-012-038 Verified Version Release including functional correctness, test coverage, code quality standards, and compliance requirements. Test cases specify expected outcomes and pass/fail criteria per GP-012 procedures.
5.5.4Document additional software unit acceptance criteriaFALSEN/ANot required for Class B software. Standard acceptance criteria through test plans sufficient. Code coverage and quality metrics tracked through pytest and development tools but formal documentation not mandatory.
5.5.5Document software unit verification resultsTRUE☑Unit verification results documented in R-TF-012-038 Verified Version Release. Test results include actual outputs, pass/fail status, and evidence. Git commit history provides verification traceability per GP-023 change control.

Software integration and integration testing​

ReferenceSoftware Lifecycle ProcessRequiredFulfilledEvidence/Comments
5.6.1Integrate software unitsTRUE☑Software units integrated following R-TF-012-023 Phase 3 "Agile and Iterative Development" strategy. Integration performed incrementally with Git version control and continuous integration. Component integration (API, Processors, Orchestrator, Report builder) documented in R-TF-012-029 Software Architecture Description and verified in R-TF-012-038.
5.6.2Verify software integrationTRUE☑Integration verification through integration testing documented in R-TF-012-038 Verified Version Release and R-TF-012-023 Phase 4. Tests verify interface functionality (REST API, FHIR compliance), data flow between components.
5.6.3Document integration testingTRUE☑Integration test strategy documented in R-TF-012-023 Software Development Plan and R-TF-012-038 Verified Version Release. Test cases specify test objectives, steps, expected outcomes for component integration per GP-012.
5.6.4Document test procedure and test case specificationTRUE☑Test procedures and cases documented in R-TF-012-033 Software Test Plan, R-TF-012-034 Software Test Description, and R-TF-012-023 Software Development Plan with test objectives, preconditions, input data, steps, expected outcomes, requirements traceability, and risk control mappings per GP-012. Results in R-TF-012-035 Software Test Report and R-TF-012-038 Verified Version Release.
5.6.5Use test procedures for conducting integration testingTRUE☑Integration testing conducted following documented test procedures in R-TF-012-023. Test execution records in R-TF-012-038 Verified Version Release document actual results, evidence (JSON outputs, API responses), pass/fail status per GP-012.
5.6.6Document integration test resultsTRUE☑Integration test results documented in R-TF-012-038 Verified Version Release including test execution records, actual outputs, evidence (API responses, FHIR resources), pass/fail status, deviations. Test summary available in verification report.
5.6.7Document regression testsTRUE☑Regression testing documented through test execution across versions. Test cases re-executed after changes to verify no adverse effects. Git version control and test execution records track regression testing. Continuous integration approach ensures regression testing after changes documented in R-TF-012-023.
5.6.8Use software problem resolution process for anomaliesTRUE☑Anomalies managed through GP-023 Change control management process. Problem reports tracked in Git issues and change control system. Problem resolution, investigation, and corrective actions documented per GP-023.

Software system testing​

ReferenceSoftware Lifecycle ProcessRequiredFulfilledEvidence/Comments
5.7.1Establish tests for software requirements validationTRUE☑System test cases established in R-TF-012-038 Verified Version Release to validate software requirements. Tests cover functional requirements (API functionality, FHIR compliance, diagnosis support), performance, safety, security, usability. Test cases traceable to requirements through "Verifies software requirements" and "Risk control for" sections per GP-012.
5.7.2Use software problem resolution process for anomaliesTRUE☑Anomalies from system testing managed through GP-023 Change control management. Problems tracked with severity assessment, investigation, resolution. Problem tracking integrated with development workflow through Git and change control procedures. Documented
5.7.3Retest after changes to softwareTRUE☑Retesting and regression testing performed after changes. Test execution records documented in R-TF-012-038 Verified Version Release show re-execution of tests. Change impact analysis per GP-023 guides retest scope. Version control in Git tracks changes and associated testing.
5.7.4Document software system testing protocolTRUE☑System testing protocol documented in R-TF-012-023 Software Development Plan Phase 4 "Software Verification" and R-TF-012-038 Verified Version Release. Protocol includes test strategy, test environment (API integration), test data, execution procedures, acceptance criteria per GP-012.
5.7.5Document software system testing resultsTRUE☑System testing results documented in R-TF-012-035 Software Test Report and R-TF-012-038 Verified Version Release with execution records, actual results, evidence (API responses, JSON outputs), pass/fail status, test coverage. Results demonstrate software meets requirements and is safe for intended use per GP-012.

Software release​

ReferenceSoftware Lifecycle ProcessRequiredFulfilledEvidence/Comments
5.8.1Ensure software verification is completeTRUE☑Release checklist in R-TF-012-038 Verified Version Release and R-TF-012-039 Validated Version Transfer verifies all verification activities complete. Test execution records demonstrate comprehensive verification. Release process in R-TF-012-023 Phase 4-5 ensures verification completion before release.
5.8.2Document known residual anomaliesTRUE☑Known residual anomalies documented in R-TF-012-038 Verified Version Release template includes "Known Limitations" section. Anomalies tracked in issue tracking system (Git issues) and release documentation. Release notes document known issues for each version.
5.8.3Evaluate known residual anomaliesTRUE☑Residual anomalies evaluated for safety impact through risk assessment (R-TF-013-002). Evaluation considers clinical impact and benefit-risk balance per GP-013 Risk management. Anomaly impact assessment documented in risk management records and release approval documentation.
5.8.4Document released versionTRUE☑Released version documented in description-and-specifications.mdx (Version 1.1.0.0), R-TF-012-038 Verified Version Release, R-TF-012-039 Validated Version Transfer, declaration of conformity (R-TF-001-007). Version information in R-TF-001-006 IFU, label (R-TF-001-008), UDI. Git tags mark releases in version control.
5.8.5Document how released software was createdTRUE☑Build process documented in R-TF-012-023 Software Development Plan. Software Bill of Materials (SBOM) in R-TF-030-001 documents components, versions, dependencies per R-TF-030-002 Cyber Security Management Plan and GP-030. Python environment, dependencies, and build procedures documented. Git repository provides complete build traceability and reproducibility.
5.8.6Ensure activities and tasks are completeTRUE☑Release approval process documented in GP-012 and R-TF-012-023. R-TF-012-038 Verified Version Release checklist verifies all activities complete including development, verification, documentation, regulatory requirements. Release requires JD-001, JD-003, JD-004 approvals per organizational roles defined in R-TF-012-023.
5.8.7Archive softwareTRUE☑Released software archived in Git repository with tags for version identification. Complete source code, documentation, test records maintained in QMS structure. GP-019 Document and record control governs archival. Git provides permanent archive with full history enabling release recreation. Backup systems ensure archive preservation.
5.8.8Assure repeatability of software releaseTRUE☑Release repeatability assured through Git version control, documented build procedures in R-TF-012-023, SBOM dependency management, and automated build processes. Git tags and commit history enable exact release recreation. Development environment specifications documented.

Software Maintenance Process​

ReferenceSoftware Lifecycle ProcessRequiredFulfilledEvidence/Comments
6.1Establish software maintenance planTRUE☑Software maintenance documented in R-TF-012-023 Software Development Plan and GP-012 procedures. Plan includes feedback handling (GP-007 Post-market surveillance), problem resolution (GP-023), modification procedures, release management. Post-market activities documented in R-TF-007-001 PMS Plan.
6.2.1Develop and document procedures for receiving feedbackTRUE☑Feedback procedures established in GP-007 Post-market surveillance and GP-021 Complaints and incident management (referenced in GP-013). Feedback channels include customer support, complaint forms, post-market surveillance. Procedures documented
6.2.1.1Document feedback evaluation processTRUE☑Feedback evaluation process documented in GP-021 (referenced in multiple procedures). Process includes review, classification, severity assessment, and action determination. Evaluation criteria and responsibilities defined in QMS procedures and R-TF-007-001 PMS Plan.
6.2.2Determine whether feedback is a problemTRUE☑Feedback evaluated per GP-021 to determine if it represents a problem requiring corrective action. Evaluation considers safety impact, performance, regulatory requirements. Determination documented in complaint investigation records and post-market surveillance tracking.
6.2.3Provide adverse event information to usersTRUE☑Adverse event communication procedures in GP-021 and regulatory requirements per MDR. Safety notifications, field safety notices communicated to users. Vigilance system in place. Communications documented and tracked per regulatory requirements.
6.2.4Documented feedbackTRUE☑All feedback documented with date, source, description, classification, evaluation per GP-021. Records maintained in complaint management system and R-TF-007-001 PMS Plan tracking. Post-market surveillance activities documented
6.2.5Document evaluation of problem reportsTRUE☑Problem report evaluations including investigation, root cause analysis, impact assessment documented per GP-023 Change control management. Evaluations recorded in change control records and complaint investigations per GP-021 procedures.
6.3.1Use software problem resolution processTRUE☑Software problems resolved using GP-023 Change control management process. Process includes problem investigation, change implementation, verification, release. Problem tracking integrated with Git version control and change management. Documented
6.3.2Analyze change request regarding patient safetyTRUE☑Change requests analyzed for patient safety impact through GP-013 Risk management. Risk assessment conducted per R-TF-013-001 plan for all changes. Safety analysis considers hazards, risk controls, benefit-risk. Results documented in R-TF-013-002 Risk management record and change control records. and /.

Software Risk Management Process​

ReferenceSoftware Lifecycle ProcessRequiredFulfilledEvidence/Comments
7.1.1Identify software items that could contribute to a hazardous situationTRUE☑Software items (API functions, AI model outputs, data processing, interfaces) that could contribute to hazards identified through hazard analysis in R-TF-013-002. Software failure modes, incorrect outputs, interface failures analyzed. Risk management integrated in GP-013
7.1.2Identify potential causes of contribution to a hazardous situationTRUE☑Potential causes including software defects, incorrect AI model outputs, data errors, API interface failures, integration issues identified in R-TF-013-002. FMEA and hazard analysis techniques used. Causes documented in risk management record per GP-013 process.
7.1.3Evaluate published SOUP anomaly listsTRUE☑SOUP anomaly lists, security advisories, CVE databases evaluated for components documented in R-TF-012-029 Software Architecture Description. Evaluation during SOUP selection and ongoing monitoring per R-TF-030-002 Cyber Security Management Plan and GP-030. SBOM documentation in R-TF-030-001 tracks components and security. Results in R-TF-013-002 SOUP risk assessments.
7.1.4Document potential causes in risk management fileTRUE☑Potential causes documented in R-TF-013-002 Risk management record with cause description, contributing software items, relationship to hazards. Risk management file includes comprehensive documentation of software-related hazards and causes.
7.2.1Define risk control measuresTRUE☑Risk control measures defined in R-TF-013-002 including software design controls (input validation, error handling), verification activities documented in R-TF-012-038 Verified Version Release, user warnings (in R-TF-001-006 IFU), operational controls. Measures documented per GP-013 Risk management process.
7.2.2Document risk control measures in risk management fileTRUE☑Risk control measures documented in R-TF-013-002 with description, implementation approach, verification methods, traceability to requirements. Implementation tracked through development activities and test execution.
7.3.1Verify risk control measuresTRUE☑Risk control measures verified through testing documented in R-TF-012-038 Verified Version Release, code reviews, validation activities per GP-012. Verification confirms effective risk reduction and proper implementation. Results documented in test execution records and R-TF-013-002. Verification activities traceable to risk controls through "Risk control for" sections.
7.3.2Document any new sequence of eventsTRUE☑New hazardous situations identified during risk control implementation documented and analyzed per GP-013 process. New risks added to R-TF-013-002 Risk management record with appropriate controls defined. Change control (GP-023) ensures new hazards from modifications are identified and addressed.
7.3.3Document traceabilityTRUE☑Traceability maintained between hazards, risks, risk controls, software requirements, design elements, verification activities. R-TF-012-043 Traceability Matrix documents complete traceability. R-TF-012-038 Verified Version Release includes "Verifies software requirements" and "Risk control for" sections. Risk management documentation (R-TF-013-002, R-TF-013-003) provide comprehensive traceability.
7.4.1Analyze changes to medical device software with respect to safetyTRUE☑Software changes analyzed for safety impact per GP-023 Change control management before implementation. Change impact analysis considers affected functions, potential new hazards, impact on existing risk controls. Analysis documented in change control records. Flowchart in GP-023 shows safety evaluation in change process.
7.4.2Analyze impact of software changes on existing risk analysisTRUE☑Impact of changes on existing risk analysis evaluated per GP-023 and GP-013 integration. Evaluation determines if risk management file update required. Impact assessment considers effect on identified hazards, risks, risk control measures. Analysis documented in change impact assessments within change control records.
7.4.3Update risk managementTRUE☑R-TF-013-002 Risk management record updated when changes affect risk analysis, new hazards identified, or risk controls modified. Updates performed per GP-013 with version control in Git and change history. Risk management plan (R-TF-013-001) states annual review and updates as needed.

Software Configuration Management Process​

ReferenceSoftware Lifecycle ProcessRequiredFulfilledEvidence/Comments
8.1.1Establishment of means to identify the configuration itemsTRUE☑Configuration items (source code, documentation, specifications, test cases) identified and controlled through Git version control. Identification scheme uses version numbers (1.1.0.0), Git commit hashes, tags. Configuration identification documented in GP-023 Change control management. Configuration items organized in QMS structure.
8.1.2Identification of SOUPTRUE☑SOUP components identified with name, version, supplier, purpose in R-TF-012-029 Software Architecture Description. SBOM documented in R-TF-030-001 with component tracking per R-TF-030-002 Cyber Security Management Plan. Python dependencies managed through requirements files. SOUP version management ensures traceability.
8.1.3Identification of system configuration itemsTRUE☑System configuration including Python runtime, API deployment environment, network configurations documented in R-TF-001-006 IFU technical specifications and STED (sted.mdx). System requirements documented in description-and-specifications.mdx. Configuration items tracked through R-TF-030-001 SBOM and deployment documentation per R-TF-030-002 Cyber Security Management Plan.
8.2.1Approve change requestsTRUE☑Change requests reviewed and approved per GP-023 Change control management. Approval authorities defined (JD-001, JD-003, JD-004) in R-TF-012-023 organization section. Approval considers technical feasibility, safety impact (flowchart in GP-023 shows safety evaluation), resources, regulatory implications.
8.2.2Implement change controlTRUE☑Change control process implemented per GP-023 including change request, evaluation, approval, implementation, verification, release. All changes tracked in Git version control and change control system.
8.2.3Communicate configuration item changesTRUE☑Configuration changes communicated to stakeholders (development team, QA, regulatory, users when applicable) per GP-023 procedures and GP-011 Provision of service for customer communications. Change notifications include description, impact, implementation status. Git commit messages and change records document communications. Release notes communicate changes to users.
8.2.4Provide means for traceabilityTRUE☑Traceability maintained through Git version control, R-TF-012-043 Traceability Matrix, test case mappings to requirements in R-TF-012-033 Software Test Plan, risk-requirement traceability in risk management. R-TF-012-038 includes "Verifies software requirements" sections. Git commit history provides complete traceability of changes. Project structure organizes documentation for traceability across requirements, design, verification, risk management.
8.3Configuration status accountingTRUE☑Configuration status tracked through Git version control (commit history, tags, branches), version documentation (description-and-specifications.mdx shows Version 1.1.0.0), change control system per GP-023. Status information available through Git logs, release documentation (R-TF-012-038), change records. Status reports generated for releases and audits. Current configuration state visible in repository structure and documentation version information.

Software Problem Resolution Process​

ReferenceSoftware Lifecycle ProcessRequiredFulfilledEvidence/Comments
9.1Prepare problem reportsTRUE☑Problem reports prepared documenting description, severity, affected versions, reproduction steps, impact. Git issues used for problem tracking. Problem report procedures defined in GP-023 Change control management. Problem reports created for defects, complaints, anomalies identified through testing, post-market surveillance, user feedback. Template and procedures in GP-023.
9.2Investigate the problemTRUE☑Problems investigated to determine root cause, scope, affected systems, potential solutions. Investigation includes code analysis, test reproduction, documentation review. Investigation results documented in problem reports (Git issues) and investigation records. Investigation approach documented in GP-023 change control process.
9.3Advise relevant partiesTRUE☑Relevant parties (development team, QA, regulatory, management, users) advised of problems per GP-023 and GP-021. Safety-critical problems follow escalation in GP-021 Complaints and incident management. Communication procedures ensure appropriate stakeholders informed. User communication through support channels and safety notices when applicable.
9.4Use change control processTRUE☑Problem resolution changes implemented through GP-023 Change control management. Process ensures changes evaluated, approved, implemented, verified, released in controlled manner. Change control records link problems to resolutions. Git version control tracks problem fixes with flowchart showing change evaluation and approval process.
9.5Maintain recordsTRUE☑Problem resolution records including problem reports (Git issues), investigations, change requests, implementation records, verification results documented in R-TF-012-038 Verified Version Release. Records stored in Git repository, change control system per GP-023, QMS documentation structure. Record retention follows GP-019 Document and record control. Git provides permanent record with full history.
9.6Analyze problems for trendsTRUE☑Problems analyzed for trends through post-market surveillance (GP-007, R-TF-007-001 PMS Plan), quality management review. Trend analysis identifies systemic issues, common failure modes, improvement areas. Analysis documented in PMS reports (R-TF-007-003 PSUR) and quality review per GP-007. Results inform preventive actions and process improvements.
9.7Verify software problem resolutionTRUE☑Problem resolutions verified through testing, inspection, review to confirm fix and no adverse effects per GP-023. Verification includes retesting fixed functionality and regression testing. Test execution documented in R-TF-012-038 Verified Version Release. Verification results documented in problem resolution records and test records. Test cases re-executed after fixes to verify resolution.
9.8Test documentation contentsTRUE☑Test documentation verified for completeness, accuracy, consistency with testing performed per GP-012. Test documentation review ensures test cases, procedures, results properly documented and traceable. Review documented in R-TF-012-038 Verified Version Release. Test plans and test runs demonstrate comprehensive documentation.

Summary​

SectionTotal ItemsRequired ItemsPercentage of Required
4. General Requirements44100%
5. Software Development544685%
6. Software Maintenance99100%
7. Software Risk Management1212100%
8. Configuration Management88100%
9. Problem Resolution88100%
Total958792%
Summary Notes

Of the 95 total items in EN ISO 62304:2006/A1:2015, 87 items (92%) are required for Class B software. The 8 items not required are specific to Class C software and relate to detailed design documentation and additional verification activities.

This summary provides an overview of compliance requirements. Complete the "Fulfilled" checkboxes during verification activities to track compliance status. Calculate fulfillment percentage by dividing fulfilled required items by total required items.

Compliance Statement​

☑ Full Compliance: All required items have been fulfilled and documented appropriately.

☐ Partial Compliance: Some items remain unfulfilled. See action plan below.

☐ Non-Compliance: Significant items are unfulfilled. Immediate corrective action required.

Signature meaning

The signatures for the approval process of this document can be found in the verified commits at the repository for the QMS. As a reference, the team members who are expected to participate in this document and their roles in the approval process, as defined in Annex I Responsibility Matrix of the GP-001, are:

  • Author: Team members involved
  • Reviewer: JD-003, JD-004
  • Approver: JD-001
Previous
R-TF-012-038 Verified Version Release
Next
EN 82304 Checklist
  • Document Information
  • Software Safety Classification
  • Primary Lifecycle Processes
    • General Requirements
    • Software Development Process
      • Software development planning
      • Software requirements analysis
      • Software architectural design
      • Software detailed design
      • Software unit implementation and verification
      • Software integration and integration testing
      • Software system testing
      • Software release
    • Software Maintenance Process
    • Software Risk Management Process
    • Software Configuration Management Process
    • Software Problem Resolution Process
  • Summary
  • Compliance Statement
All the information contained in this QMS is confidential. The recipient agrees not to transmit or reproduce the information, neither by himself nor by third parties, through whichever means, without obtaining the prior written permission of Legit.Health (AI Labs Group S.L.)