How to Choose a Data Engineering Partner for HIPAA-Regulated Life Sciences Data

Most technology vendor evaluations ask a fairly simple set of questions: Can they do the work? Have they done it before? Are they affordable?

When the data being engineered contains protected health information (PHI) — genomic sequences, diagnostic test results, patient clinical records — that checklist doesn't come close to covering what you need to know. The consequences of choosing the wrong data engineering partner in a HIPAA-regulated environment range from a formal HHS corrective action plan to criminal prosecution of company officers and, as the IBM data makes clear, an average breach response cost that can consume an entire year of operating budget.

This guide gives you 12 specific, technical criteria for evaluating data engineering partners for HIPAA-regulated life sciences work. Each criterion includes the exact question to ask, what a credible answer looks like, and the red flags that should stop the evaluation.

$10.93M Average healthcare breach cost (IBM, 2023)
81 days Average breach containment time in healthcare
12 Criteria to evaluate your next data engineering partner

The 12-Point Evaluation Framework at a Glance

Before the deep-dive, here are the 12 criteria — structured so you can use this list in your first vendor call:

1HIPAA BAA readiness and understanding
221 CFR Part 11 implementation experience
3SOC 2 Type II certification status
4PHI data masking capabilities (Delphix, DataSunrise, synthetic data)
5Audit trail implementation architecture
6Team credentials in regulated life sciences environments
7Data governance tooling (Unity Catalog, OpenMetadata)
8Demonstrated life sciences track record with named regulatory frameworks
9Cloud architecture and data residency controls
10Incident response and breach notification process
11CLIA/CAP compliance experience for diagnostics labs
12Ongoing compliance monitoring capability

Why the Stakes Are Higher in Life Sciences Data Engineering

Regulated life sciences data is subject to a layered compliance framework that general technology vendors rarely encounter:

HIPAA

45 CFR Parts 160 and 164

Governs PHI in healthcare. Requires administrative, physical, and technical safeguards, and mandates Business Associate Agreements with any vendor handling PHI.

21 CFR Part 11 (FDA)

Electronic Records & Signatures

Governs electronic records and electronic signatures in FDA-regulated research and manufacturing. Requires validated systems, immutable audit trails, unique user authentication, and electronic signature binding.

GxP

Good Laboratory, Clinical & Manufacturing Practice

Encompasses FDA and ICH quality guidelines for regulated pharmaceutical and biotech operations. Data integrity (following ALCOA+ principles -Attributable, Legible, Contemporaneous, Original, Accurate, Complete, Consistent, Enduring, Available) is the cornerstone.

CLIA

42 CFR Part 493

Federal standards for clinical laboratory testing. Imposes record retention requirements, quality control documentation standards, and test result traceability obligations specific to diagnostics labs.

CAP

CAP Accreditation

College of American Pathologists standards for laboratory quality management, with specific requirements for data system documentation and traceability.

A data engineering firm that has built pipelines for retail analytics, SaaS platforms, or financial services does not automatically understand this environment. They learn it on your project, on your timeline, using your compliance exposure as their classroom. The vendor you choose for HIPAA-regulated data engineering becomes a Business Associate under federal law. If they mishandle PHI, you share the legal and reputational consequences — regardless of what the contract says.

The 12-Point Evaluation: Deep-Dive Questions for Every Vendor

Structured so you can use this list in your first vendor call. Each criterion includes the exact question to ask, what a credible answer looks like, and the red flags that should stop the evaluation.

01
HIPAA BAA Readiness
Can They Sign and Actually Honour It?
Ask This

Will you sign a Business Associate Agreement before accessing any of our data, and can you walk me through the specific technical controls your team implements to comply with it?

A HIPAA-compliant data engineering partner must execute a BAA before any PHI engagement and demonstrate technical safeguards — AES-256 encryption at rest and in transit, role-based access controls, PHI audit logging, and workforce training documentation — not just sign a legal document.
Red flag: Vendors who offer a BAA template but can’t explain their technical safeguards. A BAA is not a compliance badge — it’s a legally binding representation of your PHI protection posture.

Under 45 CFR §164.308, any vendor who accesses, processes, or stores PHI must operate as your Business Associate. If they experience a breach involving your data, they are required to notify you without unreasonable delay, and no later than 60 days after discovery (45 CFR §164.410). The contract formalises this obligation — but the technical controls are what actually prevent the breach.

02
21 CFR Part 11 Experience
Can They Build a Validated System?
Ask This

Have you built or validated data systems under 21 CFR Part 11? Can you walk me through your approach to satisfying §11.10(a) system validation and §11.10(e) audit trails specifically?

A vendor with genuine 21 CFR Part 11 experience can articulate exactly how their pipeline architecture satisfies each requirement in §11.10: system validation with documented IQ/OQ/PQ, computer-generated time-stamped audit trails that cannot be modified or deleted, unique user authentication, and electronic signature binding.
Red flag: Vendors who say ‘we follow GxP’ without being able to specify which §11.10 technical controls they implement, or who treat Part 11 as an administrative process rather than a pipeline engineering requirement.
Unity Catalog Delta Lake Apache Airflow

21 CFR Part 11 requires that electronic records used in FDA-regulated activities meet specific technical criteria. The regulation is prescriptive: §11.10(a) requires system validation, §11.10(b) requires accurate and complete copies of records, §11.10(d) requires limiting system access to authorised individuals, §11.10(e) requires use of secure, computer-generated, time-stamped audit trails. These are engineering requirements, not legal ones — and they must be designed into the pipeline from day one, not retrofitted.

03
SOC 2 Type II Certification
Sustained Controls, Not a Snapshot
Ask This

Do you hold a current SOC 2 Type II certification, and are you willing to share the most recent report under NDA before we proceed to contract?

SOC 2 Type II certification (developed by the AICPA) demonstrates that a vendor has maintained security, availability, processing integrity, confidentiality, and privacy controls consistently over a 6–12 month audit period — not just at a single point in time. It is the minimum credentialing threshold for vendors handling PHI.
Red flag: Vendors with only SOC 2 Type I (a point-in-time snapshot), or who say ‘SOC 2 is in progress’ without a firm completion date.

The distinction between Type I and Type II matters precisely because data engineering engagements are not point-in-time events. Your vendor operates your pipelines continuously — often with persistent access to PHI environments. A Type II report, covering an extended audit window, is evidence that the security controls are operational and maintained. A Type I report tells you only that the controls existed on one particular day.

04
PHI Data Masking Capabilities
Irreversible Protection in Non-Production Environments
Ask This

How do you ensure PHI is protected in development, testing, QA, and ML training environments? Which masking tools does your team deploy, and can you explain the difference between your masking approach and encryption?

HIPAA-compliant data engineering requires irreversible PHI masking in all non-production environments — not encryption. Masking with tools like Delphix (deterministic, format-preserving masking with referential integrity) or DataSunrise (real-time dynamic masking at the database layer), combined with synthetic data generation (Tonic.ai, Synthetic Data Vault) for ML training data, ensures PHI cannot be reconstructed even if a lower environment is compromised.
Red flag: Vendors who treat encryption as equivalent to masking. Encryption is reversible with a key — compromised key management means compromised PHI. Masking transforms data irreversibly, breaking the link to the original record.
Delphix DataSunrise Tonic.ai Synthetic Data Vault

One of the most common HIPAA violations in data engineering engagements is PHI exposure in non-production environments. Developers need realistic data to build and test pipelines — but providing them with actual patient records is a HIPAA violation. The right solution is deterministic masking that preserves the statistical properties and relational integrity of the data, allowing realistic development without creating compliance exposure.

NonStop’s compliance architects can assess your current pipeline environment for PHI exposure risks across development, test, and ML training environments. Request a PHI Environment Assessment → nonstopio.com/data-engineering

05
Audit Trail Implementation Architecture
Row-Level, Immutable, and Queryable
Ask This

How does your pipeline architecture generate, store, and protect audit trails? Can you walk me through your lineage implementation from data ingestion to downstream consumption?

A properly engineered HIPAA and 21 CFR Part 11 audit trail captures access, modification, and deletion events at the row level, is immutable and time-stamped, covers the full data lineage from source system to consumption, and is queryable by compliance teams without requiring engineering support.
Red flag: Vendors who add audit logging as a pipeline afterthought — a table that logs events at the batch level rather than the row level, or that can be modified by pipeline operators.
Delta Lake Unity Catalog OpenMetadata Collate

Regulators expect to see audit trails that answer three specific questions: who touched this data, when they touched it, and what exactly they did. HIPAA’s Technical Safeguard requirement (45 CFR §164.312(b)) mandates hardware, software, or procedural mechanisms that record and examine activity in information systems containing PHI. 21 CFR Part 11 goes further, requiring that audit trails be computer-generated, time-stamped, and protected from modification or deletion — even by system administrators.

06
Team Credentials in Life Sciences
Compliance Expertise Embedded in Engineering
Ask This

What percentage of your data engineering team has direct experience building and validating pipelines in HIPAA-regulated or GxP environments? Can you provide specific examples?

In regulated life sciences data engineering, HIPAA and GxP expertise must be embedded in the engineering team — not delegated to an attached compliance consultant. Every pipeline architect should understand PHI handling requirements, audit trail design, and validation protocols as core engineering skills.
Red flag: A generalist data engineering team with one ‘compliance consultant’ bolted on. This structure means compliance reviews happen after engineering decisions are made — not during architecture design, where they have the most impact.

A data engineer who has previously built PHI pipelines makes design choices at the whiteboard stage that prevent compliance rework later — they naturally think about audit trail placement, masking layers, and access control granularity because these are embedded in how they conceptualise pipeline architecture. A team learning your regulatory environment in real time will get there eventually, but you will pay for the learning curve in both time and risk.

07
Data Governance Tooling
Runtime Controls and Metadata Governance
Ask This

Which data governance platforms does your team deploy in life sciences engagements, and how does your implementation map each tool to your client's specific regulatory obligations?

Enterprise-grade data governance in life sciences requires both runtime access control (Databricks Unity Catalog) and metadata governance (OpenMetadata/Collate). Unity Catalog provides column-level security, row-level filtering, attribute-based access control, and built-in lineage. OpenMetadata provides data catalog, lineage tracking, data quality integration, ownership workflows, and audit-ready metadata management. One enforces controls; the other makes them auditable and discoverable.
Red flag: Vendors who use 'data governance' as a vague capability claim without being able to name their tooling stack or map it to your specific regulatory requirements.
Databricks Unity CatalogOpenMetadataCollateApache RangerAWS Lake Formation

The governance tools your vendor deploys determine whether a compliance auditor can independently verify your data access controls or must take your word for it. Unity Catalog provides column-level access controls so a clinical research analyst can access de-identified genomic data columns without exposure to linked PHI columns — at the platform level, without application-layer workarounds. OpenMetadata provides the searchable, documented trail of what data exists, where it came from, who owns it, and what quality standards it meets.

08
Demonstrated Life Sciences Track Record
Specific, Not Vague
Ask This

Can you share case studies or references from data engineering engagements specifically in HIPAA-covered environments? What regulatory frameworks did those engagements operate under, and what was the scope of your implementation?

A vendor with genuine life sciences experience can name the regulatory frameworks their previous engagements operated under (HIPAA, 21 CFR Part 11, CLIA, GxP), describe specific pipeline components they built and validated, and provide references from clients in genomics, diagnostics, or pharma — not just 'healthcare IT' broadly.
Red flag: Vendors who describe 'healthcare IT experience' without distinguishing between HIPAA-covered clinical data and uncovered research data, or who conflate general data analytics for health insurance with regulated genomic or clinical pipeline work.

The difference between a healthcare IT engagement and a life sciences data engineering engagement is often the difference between building a reporting dashboard and building a validated, GxP-compliant data pipeline that a regulatory submission depends on. Ask vendors to be specific: What system did you build? Which regulation governed it? Who validated it?

09
Cloud Architecture and Data Residency
Designed In, Not Bolted On
Ask This

How do you architect for data residency requirements in cloud environments? What controls prevent PHI from replicating outside designated regions, and how do you validate that all cloud services are covered under the cloud provider's Business Associate Agreement?

HIPAA-compliant cloud architectures must address data residency from the design phase — including region-locked storage with AWS SCPs or Azure Policy enforcement, customer-managed encryption keys (CMEK), and explicit validation that every cloud service in the pipeline is covered under the relevant cloud provider's HIPAA BAA.
Red flag: Vendors who default to multi-region architectures without proactively asking about your data residency requirements, or who cannot enumerate which cloud services are HIPAA-eligible in their standard architecture.
AWS HIPAA-eligible servicesAzure HIPAA configGCP HIPAA servicesAWS SCPsAzure Policy

Not all cloud services are covered under cloud providers' HIPAA BAAs. AWS, Azure, and GCP each publish explicit lists of BAA-covered services, and data flowing through an uncovered service constitutes a HIPAA violation regardless of contract language. A vendor that cannot enumerate which services are BAA-covered in its standard architecture has not been audited in a healthcare environment.

10
Incident Response and Breach Notification
PHI Breach Notification Is a Legal Obligation
Ask This

What is your documented incident response process for a potential PHI breach? What is your notification SLA to us, and can you produce your IR plan during evaluation?

A HIPAA-compliant data engineering partner must maintain a documented, tested incident response plan with PHI breach notification obligations explicitly defined in the BAA — and must be able to produce that IR plan during the vendor evaluation process, not after contract signing.
Red flag: Vendors who have not tested their incident response process, cannot produce an IR plan, or who state notification timelines without being able to show documented runbooks that support them.

Under the HIPAA Breach Notification Rule (45 CFR §164.400–414), your Business Associate must notify you of a breach without unreasonable delay and in no case later than 60 calendar days after discovery. What actually matters operationally is whether they have a tested process for detecting and containing a breach quickly — because 60 days is the legal maximum, not the operational target. Average breach containment in healthcare takes 81 days; breaches contained in under 30 days cost significantly less (IBM, 2023). Ask for evidence that their IR process has been tested through a tabletop exercise within the past 12 months.

11
CLIA and CAP Compliance Experience
Requirements for Clinical Diagnostics Labs
Ask This

If our organisation operates as a clinical laboratory, does your team understand CLIA requirements under 42 CFR Part 493 as they apply to data systems supporting patient test reporting, including record retention and test result traceability?

Clinical diagnostics labs need data engineering partners who understand CLIA requirements separately from HIPAA — including the 42 CFR Part 493 record retention mandates (minimum 2 years for most test records, 10 years for immunohematology), test result traceability requirements, quality control documentation standards, and how these affect pipeline architecture decisions like data partitioning strategy and immutable record storage.
Red flag: Vendors who conflate CLIA with HIPAA, treating them as equivalent compliance requirements. HIPAA is a privacy and security framework; CLIA is a laboratory quality standard. They have different regulatory bodies (HHS Office for Civil Rights vs CMS), different requirements, and different audit processes.

The clinical diagnostics space requires data engineering solutions that satisfy both regulatory layers simultaneously. A pipeline that is HIPAA-compliant but does not meet CLIA record retention requirements creates a compliance gap that only surfaces during a CMS inspection — not during a HIPAA audit. Diagnostics-specific requirements such as test result traceability have direct implications for how data is stored and versioned in the lakehouse.

12
Ongoing Compliance Monitoring
Because Compliance Drifts
Ask This

After implementation, how does your team monitor for compliance drift — new PHI exposure vectors from schema changes, new data sources, regulatory updates, or access control degradation over time?

Compliance monitoring in regulated data pipelines must be continuous — not a project deliverable. This includes automated PHI detection on new datasets, schema change alerting that triggers masking rule review when new fields appear, access control review cadences that detect permission drift before regulators do, and data observability monitoring that flags anomalies indicating data integrity violations.
Red flag: Vendors who treat compliance implementation as a one-time project with a handoff at the end. Schema drift — where a new data field silently contains PHI not accounted for in existing masking rules — is one of the most common real-world sources of PHI exposure, and it only happens after go-live.
AWS MacieMicrosoft PresidioGreat ExpectationsDatabricks Lakehouse Monitoring

Schema evolution is a constant reality in life sciences data pipelines. Source systems update. New instruments are added. EHR vendors release API changes. Each change is a potential PHI exposure vector if your masking and governance rules do not automatically adapt. A vendor who builds a compliant pipeline and then leaves you to manage it without ongoing monitoring tooling has shifted the compliance risk back to you.

The Evaluation Red Flags Nobody Mentions in RFPs

Beyond the 12 criteria above, watch for these subtler warning signs during vendor conversations.

They know HIPAA but not 21 CFR Part 11, or vice versa

In life sciences data engineering, these two regulatory frameworks are often required simultaneously. A vendor fluent in one but unfamiliar with the other has a domain gap.

They describe compliance as a ‘layer’ added to the pipeline

Compliance in regulated data environments is not a layer — it’s an architectural principle that must inform every design decision, from table partitioning to secret management. The language a vendor uses to describe compliance tells you how deeply it’s embedded in their engineering practice.

Their reference engagements are all in health insurance, not clinical or research settings

Health insurance data is HIPAA-covered, but the engineering complexity and regulatory depth differ from those of genomics pipelines, drug development data systems, or clinical diagnostics platforms.

They quote ‘best practices’ without naming them

In regulated environments, ‘best practice’ is specific: published FDA guidance, NIST frameworks, and HHS technical safeguard specifications. Vague references to best practices without source documents signal that the vendor is pattern-matching to your vocabulary rather than drawing on deep domain knowledge.

They have no compliance team involvement in the sales process

In a legitimate life sciences data engineering firm, a compliance architect is involved in scoping and solution design from the first technical conversation — not introduced at contract review.

How NonStop.io Meets All 12 Criteria

NonStop.io is a digital product engineering firm specializing in data infrastructure for genomics, diagnostics, and biotech/pharma. Our data engineering practice is built specifically for regulated life sciences environments — not adapted from general-purpose enterprise data work.

Our engagements are structured as phased deliverables — BAA execution and compliance architecture design first, followed by pipeline implementation, validation, and ongoing monitoring — so your organisation has a documented compliance posture at every milestone, not just at project completion.

12-Point Criterion

How NonStop.io Meets It

HIPAA BAA

Yes - BAA executed before any PHI engagement. Technical controls documented and auditable.

SOC 2 Type II

Available under NDA with current certification status.

Audit Trails

Immutable row-level lineage via Delta Lake; full catalog lineage via OpenMetadata/Collate; access control audit via Unity Catalog.

Team Credentials

Engineers with direct experience across genomics labs, diagnostics companies, and pharma R&D - not generalist data teams.

Governance Tooling

Unity Catalog for runtime governance; OpenMetadata/Collate for metadata governance, data discovery, and audit readiness.

Track Record

Active engagements in genomics, clinical diagnostics (CLIA environments), and pharma data platforms under GxP.

Monitoring

Continuous compliance monitoring with automated PHI detection, schema change alerting, and access control review cadence.

Talk to a NonStop Compliance Architect

If you’re preparing a vendor evaluation for HIPAA-regulated data engineering work, NonStop’s compliance architects are available for a 45-minute evaluation prep call to cover your specific regulatory environment, pipeline scope, and the questions that matter most to your team.

Schedule Your Evaluation Call →

Frequently Asked Questions

Q1What is a HIPAA Business Associate Agreement, and why does my data engineering vendor need to sign one?

A Business Associate Agreement (BAA) is a legally binding contract required under 45 CFR §164.308 of HIPAA between a covered entity (such as a healthcare provider or health plan) and any vendor that accesses, processes, transmits, or stores protected health information (PHI) on its behalf. A data engineering vendor that builds, maintains, or operates pipelines that handle your patient data qualifies as a Business Associate and must execute a BAA before any PHI engagement. The BAA defines the permitted uses of PHI, specifies required safeguards, and establishes the vendor’s obligation to notify you of breaches within 60 days of discovery. Without a BAA, any PHI access by the vendor constitutes a HIPAA violation.

Q2What does 21 CFR Part 11 compliance mean for data pipelines?

21 CFR Part 11 is an FDA regulation governing electronic records and electronic signatures used in FDA-regulated activities — including clinical trials, drug manufacturing, and laboratory operations. For data pipelines, the core requirements are: (1) system validation with documented Installation Qualification (IQ), Operational Qualification (OQ), and Performance Qualification (PQ); (2) computer-generated, time-stamped audit trails that record operator entries and actions and cannot be modified or deleted; (3) limiting system access to authorised individuals; (4) use of authority checks to ensure that only authorised individuals can use the system, electronically sign records, or access operations. Data engineering vendors must design these requirements into pipeline architecture from the start — they cannot be retrofitted after deployment.

Q3What is the difference between PHI encryption and PHI data masking?

Encryption is a reversible transformation that protects data in transit and at rest, but it can be decrypted by anyone with the encryption key. In a pipeline environment with multiple engineers and systems, key management is complex, and a compromised key means compromised PHI. Data masking is an irreversible transformation that replaces PHI with realistic but fictitious data — a Social Security Number becomes a different, plausible-looking number, a patient name becomes a different name. Masked data cannot be reversed to its original state, even with full system access. Under HIPAA, non-production environments (development, testing, QA, ML training) must not contain actual PHI — masking or synthetic data generation is required, not just encryption.

Q4What is SOC 2 Type II, and why does it matter for data engineering vendors?

SOC 2 is an auditing standard developed by the AICPA that evaluates a service organization’s controls for security, availability, processing integrity, confidentiality, and privacy. Type I is a point-in-time assessment — it shows controls existed on the audit date. Type II covers a sustained period (typically 6–12 months) and provides evidence that controls are operating consistently over time. For data engineering vendors handling PHI, Type II is the relevant standard because it demonstrates that security practices are maintained operationally, not just during vendor evaluation. Always request the most recent Type II report under NDA before contract signing.

Q5What tools are used for PHI data masking in life sciences data pipelines?

The primary tools used for PHI masking in life sciences data engineering are: Delphix, which provides deterministic static masking with format preservation and referential integrity — critical when masked data must remain joinable across tables; DataSunrise, which provides real-time dynamic data masking at the database layer and database activity monitoring for access audit trails; Tonic.ai and Synthetic Data Vault, which generate fully synthetic datasets that preserve the statistical distributions and relational properties of the original data without containing any actual PHI — essential for ML training environments where realistic data is needed at scale. The choice between static masking, dynamic masking, and synthetic data generation depends on the use case: development environments typically need static masked copies, real-time applications may need dynamic masking, and ML training pipelines benefit from synthetic data.

Q6What makes NonStop.io different from general data engineering firms for HIPAA-regulated life sciences work?

NonStop.io’s data engineering practice is built specifically for regulated life sciences environments rather than adapted from general enterprise data work. The key differences: engineering teams with direct experience in HIPAA-covered environments (genomics labs, clinical diagnostics, pharma R&D) rather than generalist data teams learning the domain on client projects; compliance expertise embedded in pipeline architecture design rather than provided by an attached compliance consultant; a tooling stack selected for life sciences regulatory requirements (Delphix/DataSunrise for masking, Unity Catalog for governance, Delta Lake for immutable audit trails, OpenMetadata for lineage); and a delivery structure that produces documented compliance posture at every project milestone, not just at completion. NonStop executes HIPAA BAAs before any data engagement and has active engagements in CLIA-regulated diagnostics and GxP pharma environments.

References & Sources
IBM Cost of a Data Breach Report 2023. ibm.com/reports/data-breach — Healthcare industry average breach cost: $10.93M (13th consecutive year leading all industries). Average breach containment time: 81 days.
U.S. Department of Health and Human Services (HHS). HIPAA for Professionals. hhs.gov/hipaa/for-professionals — Business Associate requirements (45 CFR §164.308), Technical Safeguards (45 CFR §164.312), Breach Notification Rule (45 CFR §164.400–414).
Centers for Medicare & Medicaid Services (CMS). Clinical Laboratory Improvement Amendments (CLIA). cms.gov/Regulations-and-Guidance/Legislation/CLIA — Record retention requirements under 42 CFR Part 493.
AICPA. SOC 2 — Trust Services Criteria. aicpa.org/interestareas/frc/assuranceadvis
oryservices/sorhome — SOC 2 Type I vs Type II distinction and audit scope.
Databricks Unity Catalog Documentation. docs.databricks.com — Column-level security, row-level filtering, access control model, and built-in lineage.
OpenMetadata Documentation. docs.open-metadata.org — Data catalog, lineage tracking, data quality integration, and governance workflow capabilities.
Delphix Platform Documentation. docs.delphix.com — Deterministic data masking, format-preserving masking, and referential integrity preservation.
Microsoft Presidio (open-source PII/PHI detection). github.com/microsoft/presidio — Customizable PII detection engine for automated PHI scanning in data pipelines.
AWS HIPAA Compliance. aws.amazon.com/compliance/hipaa-compliance — List of AWS HIPAA-eligible services covered under the AWS Business Associate Agreement.
ICH Q10 Pharmaceutical Quality System. ich.org/page/quality-guidelines — GxP data integrity framework and ALCOA+ principles guidance for pharmaceutical data systems.