Paperless |
Home | Learn more about eQMS or call for information: 719-649-4242 Hold your smartphone in landscape mode for best view | Cookies required to operate eQMS Dag nabbit Norton, stop reporting false positives - we've been online 20 years! Consider whitelisting our web address to evaluate eQMS. In your Norton, go to Security - Advanced Security - Safe Web - Exclusions, then add our web address to evaluate eQMS. |
Log In |
Configuration Management, Short VersionTable of Contents - Click here for PDF demo - opens in new tab 1.0 Purpose 1.0 PURPOSE
2.0 THEORY This procedure has been developed based on practices defined in ... 3.0 CONFIGURATION DOCUMENTATION These may include, but are not limited to:
3.2. All such technical documents are developed and approved by the Responsible Authority, which are then controlled according to this procedure. (See Section 4.0) 3.3. Configuration documents and Customer intellectual property received by is the Company are ... 4.0 CONFIGURATION CONTROL BOARD (CCB) 4.2. CCB responsibilities include:
5.0 CONFIGURATION CHANGE CONTROL 5.2. All associated changes and affected hardware items or computer programs are... 5.3. Types of Configuration Change 5.4. Change Classification
5.4.2. Class II Changes Any change that does not fall within the Class I definition is a Class II change. Class II changes are ... 5.5. Change Implementation 5.6. Document approval is indicated by...:
6.0 SUBCONTRACTOR AND VENDOR CHANGES 7.0 PRODUCT AND TEST SOFTWARE CONTROL 8.0 REVISION HISTORY AND APPROVAL RECORD Quality System Procedure Copyright © JnF Specialties, LLC. All rights reserved worldwide. PROPRIETARY INFORMATION - UNCONTROLLED IF PRINTED UNLESS OTHERWISE MARKED |