Summary

The List of Known Anomalies documents all residual software bugs or anomalies that exist in your medical device software but will not be corrected prior to the current software release, including their risk impact and planned correction timeline.

Why is a List of Known Anomalies important?

The List of Known Anomalies is essential for demonstrating transparency and risk management in software medical devices. It shows regulatory authorities that you have thoroughly tested your software, identified all known issues, and made informed decisions about which anomalies are acceptable for release based on risk assessment. This document protects both patients and your organization by ensuring that all stakeholders understand the limitations of the current software version and that appropriate risk controls are in place. Without this documentation, you cannot demonstrate that you have adequately assessed the safety implications of releasing software with known issues.

Regulatory Context

Under 21 CFR Part 820 (Quality System Regulation) and FDA Software Guidance:

  • All known software anomalies must be documented and risk-assessed
  • Risk-based approach required for determining which anomalies are acceptable for release
  • Software validation must include anomaly assessment (21 CFR 820.70(i))
  • Change control procedures must address anomaly corrections in future releases

Special attention required for:

  • Class III software devices requiring more stringent anomaly documentation
  • Software as Medical Device (SaMD) requiring comprehensive anomaly risk assessment
  • Cybersecurity-related anomalies requiring immediate attention regardless of risk level
  • AI/ML devices where anomalies may indicate training data or algorithm issues

Guide

Your List of Known Anomalies must provide complete transparency about software issues that remain in your device at the time of release. This document demonstrates your commitment to patient safety through honest disclosure and risk-based decision making.

Software Version Documentation

Clearly specify the software-version for which this anomaly list applies. Each software release should have its own anomaly list, allowing for proper version control and traceability. This ensures that stakeholders understand exactly which version of your software contains the documented anomalies.

Comprehensive Anomaly Documentation

Your known-anomalies table must include detailed information for each anomaly. Document the Name of Anomaly using clear, descriptive terminology that allows easy identification. Provide a comprehensive Description that explains what the anomaly is, when it occurs, and under what conditions it manifests.

Risk Impact Assessment

For each anomaly, assess its Impact on Risk using the three-tier system: “No impact on risk” for issues that cannot lead to patient harm, “Low impact on risk” for issues that could cause minor patient harm, and “Significant impact on risk” for issues that could cause serious patient harm. This assessment must align with your overall risk management approach and risk acceptability criteria.

Risk Acceptability Determination

Determine whether each anomaly’s risk is Risk Acceptable based on your established risk matrix. Anomalies with “No impact on risk” or “Low impact on risk” can typically be marked as “Acceptable,” while those with “Significant impact on risk” should be “Unacceptable” and require immediate correction before release.

Correction Planning

Document your Correction Action(s) for each anomaly, describing specific steps you will take to address the issue in future releases. Provide realistic Correction Timeline estimates such as “Next major software release,” “Next minor software release,” or “Next bug fix,” allowing stakeholders to understand when improvements will be available.

Quality Assurance Integration

Ensure your anomaly list integrates with your overall quality management system. Anomalies should be tracked through your software problem resolution process and may trigger change management or CAPA procedures depending on their severity and impact.

Example

Scenario: You develop a telemedicine platform for remote patient monitoring. During final testing, you identify three software anomalies: a minor UI display issue, a data synchronization delay, and an occasional login timeout. You assess their risk impact and determine correction priorities for the next software releases.

List of Known Anomalies

ID: LKA-001

1. Scope

The list within this document identifies the residual anomalies or “bugs” that exist in the software that will not be corrected prior to the software release in this version.

Software Version: v2.1.0

2. Known Residual Anomalies

Name of AnomalyDescriptionImpact on RiskRisk AcceptableCorrection Action(s)Correction Timeline
Patient List Display TruncationPatient names longer than 25 characters are truncated in the main patient list view, showing only the first 25 characters followed by ”…”No impact on riskAcceptableImplement dynamic text sizing and tooltip display for full namesNext minor software release
Data Sync DelayPatient vital signs data synchronization between mobile app and web portal experiences delays of 30-60 seconds under high network load conditionsLow impact on riskAcceptableOptimize data synchronization algorithm and implement progressive sync for large datasetsNext major software release
Session Timeout WarningUsers occasionally do not receive the 5-minute session timeout warning dialog, resulting in unexpected session termination during data entryLow impact on riskAcceptableRefactor session management system and implement redundant timeout warning mechanismsNext bug fix

Q&A