clinstead
Governance

Designed for auditability.

Clinstead is being built with the operating discipline regulated research expects: versioned study definitions, controlled deployment, audit-aware workflows, role-aware access, reason-for-change capture, human-approved automation and evidence-ready operational records.

Clinstead does not claim certifications it has not earned. The goal is simple: make the study easier to inspect, easier to govern and safer to change.

Six pillars

Governance as a property of the canonical model.

Governance at Clinstead is not a compliance checkbox. Each pillar is intended to be a structural property of the canonical study model, enforced at the data layer before any application logic runs.

Built for auditability

Track important study, data, deployment and operational changes with actor, timestamp, reason and study-version context.

Controlled change by design

Use versioned study definitions, amendment diffs, deployment records and approval gates to reduce change-management risk.

Role-aware access

Workflows are designed around the real roles in clinical research: trial managers, data managers, monitors, site staff, PIs, sponsors and participant ops.

Evidence-ready operations

Connect release records, validation evidence, documentation, audit packs and lock-readiness workflows to the live study environment.

Human-approved automation

Agents can draft, recommend and surface risks, but high-risk study actions require human review and approval.

Privacy-conscious workflows

Permission boundaries, participant preferences, communication controls and careful handling of study data across the platform.

Designed for

The operating discipline regulated research expects.

  • Audit trails
  • Controlled deployment
  • Role-aware access
  • Versioned study definitions
  • Reason-for-change workflows
  • Evidence-ready operations
  • Human-approved agents
Access architecture

Role-scoped permissions enforced at the data layer.

Access is not a UI concern. Permission checks run at the canonical model layer, so study blinding and site isolation are not bypassable from API access, custom integrations or administrative tooling.

Endpoint masking

Sensitive endpoints are identity-masked at the data layer before any application reads them.

Unblinding workflows

Re-authentication, mandatory justification and audited regulatory notification on unblinding events.

Site-scoped credentials

Access tokens are bound to specific site contexts and reissued on protocol amendment.

Delegation of authority

Sub-investigator and staff assignments tracked with dates, scope and training-completion gates.

Electronic signatures

A three-step sign-off process.

Built workflows for PI sign-off on forms, visits and casebooks — with mandatory re-authentication and meaning-of-signature capture at every step.

  1. 01
    Action trigger

    PI or authorised personnel initiates a sign-off action on a form, visit or complete casebook from within SteadEDC.

  2. 02
    Re-authentication

    Mandatory re-authentication via password or MFA before the signature can be applied. Identity is bound to the active session.

  3. 03
    Meaning capture

    Signatory selects from a study-defined list of signature meanings (e.g. “I have reviewed and verified this data”) — the meaning is stored alongside the signature.

Talk to us

Review our governance capabilities in depth.

We’ll walk through the technical architecture of Clinstead’s audit, access and signature systems alongside the canonical model itself.