Navigating FDA and MDR Compliance: Managing the Device Lifecycle and Embedded Software Updates in Medical Devices - Dr. Baya Oussena
Download nowTable of contents
- Foreword
- Article Statement
- Part 1: Understanding the Scope and Structure of FDA and MDR Regulations
- Part 2: Navigating FDA and MDR Compliance: Device Lifecycle Management
- Part 3: Navigating FDA and MDR Compliance: Embedded Software Updates
- Part 4: Case Studies — Updates Under FDA and MDR
- Use Case 1: Updating an implantable Responsive Neurostimulator Device.
- Use Case 2: Updating a Peritoneal Dialysis Cycler Device
- Use Case 3: Updating a Connected Hydration Patch by Adding Sleep-Aware Dehydration Risk Prediction
- Final Thoughts: Lessons Learnt
Foreword
The convergence of software innovation and regulatory compliance creates complex challenges for medical device manufacturers. As advancements in connected technology innovate the medical industry, it clearly introduces layers of regulatory complexity that many organizations struggle to navigate.
Today, 20% of medical device recalls are now software-related, making software issues the leading cause of device recalls. Simultaneously, cybersecurity threats against medical devices increased 278% over the past two years, making secure, compliant over-the-air updates a patient safety imperative.
Software updates in regulated environments are fundamentally different from consumer technology updates. When a smartphone update fails, users experience inconvenience. When a medical device update fails, patients face potential harm. The reality for connected healthcare demands a deliberate cybersecurity approach that maintains innovation velocity while ensuring safety via regulatory compliance.
The three case studies presented in this report illustrate how the regulatory burden of software updates scales exponentially with device complexity and connectivity. A simple firmware patch can trigger months of documentation, testing, and regulatory review if the proper infrastructure isn't in place from the beginning.
Thus, purpose-built OTA update platforms become essential. Generic update mechanisms designed for consumer devices lack the audit trails, rollback capabilities, regulatory compliance guarantees, and risk management frameworks that medical device manufacturers require. There is a drastic difference between a consumer OTA update and a medical-grade OTA update, as evident in the equally complex regulations aimed at ensuring safety in connected medical devices.
Furthermore, modern medical device development requires a fundamentally different approach to software lifecycle management. The days of treating embedded software as a secondary concern are over. To remain compliant and competitive across jurisdictions, devices require end-to-end traceability, bidirectional documentation, and integrated toolchains. Today's medical devices are software-first products that also have hardware components, not the reverse.
Looking ahead, the regulatory landscape will only become more demanding. The US FDA's emerging guidance on AI/ML-based devices, the MDR's increasing emphasis on cybersecurity, and the growing expectation for real-world evidence collection all point toward a future where software updates become even more critical and complex than they are today.
Organizations that view OTA update infrastructure as a technical afterthought rather than a strategic compliance enabler are essentially building houses without foundations. The question isn't whether you'll need robust, compliant update capabilities, but whether you'll have them in place before your next regulatory audit or cybersecurity incident.
Dr. Oussena's work provides a roadmap for navigating the regulatory complexity in great detail. And the companies that follow it will be better positioned to survive in an increasingly regulated environment.
Article Statement
Regulatory bodies, such as the U.S. Food and Drug Administration (FDA) and the Medical Device Regulation (MDR), ensure the safety, effectiveness, and quality of medical devices. For software-driven devices, compliance is an ongoing process; each update or modification can present regulatory challenges for manufacturers. The rapid pace of software innovation makes navigating regulations more complex. Proactively addressing these challenges enhances quality, improves reliability and safety, and adds value for both patients and healthcare providers.
Key regulatory challenges include maintaining compliance without compromising device cybersecurity or clinical performance, as well as ensuring that all software changes, updates, patches, and design modifications are documented and traceable. Quality system processes must support change control, linked to Unique Device Identification, Post-Market Surveillance, Corrective and Preventive Action activities. Compliance must align with FDA Part 820, MDR Annexes II and III, and ISO 13485:2016, ensuring audit readiness and adherence to all relevant standards.
This article examines the compliance challenges faced by medical device manufacturers under the FDA and MDR, with a focus on embedded software updates and device lifecycle management. It provides practical advice on synchronising engineering, regulatory, and quality functions to adapt to changing standards and regulations.
The article is divided into four parts. Part 1 offers an overview of FDA and MDR regulations, emphasising the main similarities and differences between them. Parts 2 and 3 explain the compliance requirements that manufacturers must meet when managing the Medical Device Lifecycle and Embedded Software Updates, respectively. Part 4 concludes with hypothetical Case study examples illustrating how to manage software updates effectively throughout the device lifecycle.
Part 1: Understanding the Scope and Structure of FDA and MDR Regulations
1. Introduction
The FDA and MDR are regulatory frameworks for medical devices, focusing on safety, efficacy, and quality, but differ in scope and implementation. The FDA oversees the US market with premarket approval, risk classification, and post-market surveillance. The MDR, enforceable across the EU, is stricter than the previous Medical Device Directive, emphasising clinical evaluation, Unique Device Identification, and Post-Market monitoring. Covering the entire device lifecycle, these regulations place more responsibility on manufacturers, especially for software-driven and high-risk devices. Understanding both is crucial for achieving global market access and maintaining long-term compliance.
Both the FDA and MDR processes assess device compliance before marketing. The FDA has two pathways: 510(k) for moderate risk, where manufacturers must demonstrate substantial equivalence to an existing device, which the FDA reviews without third-party involvement; and PMA for high-risk devices. At the same time, MDR involves a more rigorous assessment and documentation across all risk levels.
2. Overview of FDA and MDR Processes
The FDA and MDR aim to safeguard patient safety, but the MDR is more prescriptive and lifecycle-focused in its approach to clinical evidence and post-market surveillance. Manufacturers must understand these nuances to meet compliance requirements and access both markets. Familiarity with these processes is crucial for complying with regulations and ensuring the safe and effective delivery of medical devices.
2.1 MDR Framework
Under the MDR, the conformity assessment process depends on device risk classification: low-risk Class I devices can self-assess, while higher-risk devices require Notified Body certification, which evaluates technical documentation, clinical data, and regulatory compliance. This documentation must demonstrate full compliance with all MDR safety and performance requirements before marketing.
2.1.1 MDR Key Regulation and Guidance
- MDR EU 2017/745: replaces MDD-93/42/EEC with requirements that directly influence design and development processes. It introduces stricter controls on clinical evidence, more comprehensive technical documentation, and ongoing post-market surveillance.
- General Safety and Performance Requirements – GSPR (Chapter II, Annexe I): Similar to the FDA’s design controls, this approach includes software validation and clinical evidence.
- Post-Market Surveillance and Vigilance (Chapter VII, Annexe III): Mandates systematic monitoring, incident reporting, and field safety corrective actions.
- Unique Device Identification - UDI (Annexe III, Annexe I): Mandatory for traceability, including software versions to ensure full traceability across production, deployment, and field operations.
- EUDAMED: European Database on Medical Devices — essential for transparency and tracking.
- MDCG Guidance: The Medical Device Coordination Group (MDCG) issues approved guidance documents to ensure consistent interpretation and implementation of the MDR. These include crucial clarifications on clinical evaluation, software qualification, cybersecurity, PMS, and other key areas, serving as best practices when preparing regulatory documentation and demonstrating compliance.
2.1.2 MDR Processes:
- Device Classification (Chapter V, Annexe VIII): Devices are classified into four classes (I, IIa, IIb, III) based on risk, with higher-risk devices needing stricter regulation assessment.
- Conformity Assessment (Chapter V, Annexe IX, X, XI): Manufacturers must select a conformity assessment route based on the class, often involving a Notified Body for higher-risk cases.
- Technical Documentation (Chapter II, Annexe II): Manufacturers must compile comprehensive technical documentation demonstrating compliance with MDR requirements.
- Clinical Evaluation (Chapter VI, Annexe XV): Preparing a clinical evaluation report usually involves collecting clinical data or conducting studies to demonstrate the device’s safety and performance.
- Labelling and Post-Market Surveillance (Annexes I, II, III, XIV Part B): Devices must be labelled in accordance with the MDR regulation. Post-market surveillance systems are required to monitor device performance after the device is released to the market.
2.2 FDA Framework
The FDA process differentiates between moderate- and high-risk devices. Most moderate-risk devices (Class II) follow the 510(k) notification process. High-risk devices (Class III) require Premarket Approval (PMA), a rigorous pathway that demands extensive evidence, including clinical trial data, to demonstrate safety and effectiveness.
For the 510(k) pathway, a device must be 'substantially equivalent” to an existing marketed device. If no equivalent exists, manufacturers may reclassify their device as lower risk and submit evidence, such as technical data and clinical studies, to demonstrate its safety and performance. Without equivalence, the FDA might require a Premarket Approval (PMA) review, which is more rigorous.
FDA Key Regulation and Guidance:
- 21 CFR Part 820 (Quality System Regulation – QSR): Clarifies essential quality management requirements, including design controls, verification and validation (V&V), and change management procedures.
- 21 CFR Part 11: Applies to electronic records and signatures, especially relevant for software development tools and digital traceability systems.
- FDA Guidance on Software: Multiple guidance documents cover Software as a Medical Device (SaMD), software modifications, cybersecurity, and artificial intelligence/machine learning-based software.
2.2.2 FDA Processes:
- Device Classification: Devices are categorised into three classes (I, II, III) based on risk. Higher-risk devices require a more rigorous review of requirements.
- Premarket Notification (510(k)): For devices that are not Class III, manufacturers must prove their device is substantially equivalent to a legally marketed device.
- Premarket Approval (PMA): High-risk Class III devices require a PMA, which involves a thorough review process to ensure their safety and effectiveness.
- Clinical data might be necessary for both 510(k) and PMA submissions to prove device performance.
- Labelling and Post-Market Surveillance: Devices must meet FDA labelling requirements and have systems for continuous performance monitoring.
3. Main Struggles for Medical Device Makers
Securing market approval and maintaining a presence is tough due to navigating compliance, managing documents, and adapting to changing standards. Startups and device manufacturers often struggle with the US FDA or EU MDR regulations. It can be complex to understand the requirements for each device class, including SaMD or embedded software, which can lead to wasted resources, missed deadlines, or rejected submissions. Companies face several key challenges, including:
3.1 Documentation Overload and Audit Readiness
Keeping comprehensive, structured documentation is no longer a choice. Both the FDA and MDR require detailed traceability from user needs down to source code and verification tests. This includes:
- Design History Files (DHF) and Device Master Records (DMR) for the FDA.
- Technical documentation per the GSPR under MDR
- Evidence of software validation and usability testing.
- Ensure robust version control and maintain audit trails for all updates.
Challenge: getting all stakeholders, including R&D, regulatory, and QA, to work together in real-time to produce auditable and consistent records throughout the development and maintenance phases.
3.2 Managing Software Changes and Risk Re-Evaluation
Software rarely remains unchanged after approval. Updates often involve bug fixes, usability improvements, cybersecurity patches, and upgrades to AI models.
According to the MDR, even minor software updates can trigger a “significant change', requiring re-certification by a notified body. The FDA demands risk-based justification for any change and expects a comprehensive analysis of the impact on safety and effectiveness.
Challenge: balancing agility with regulatory rigour, ensuring that product teams can implement timely updates without causing compliance delays or incurring regulatory penalties.
3.3 Classification and Reclassification of Software
Under the MDR, many standalone software products are now classified as higher risk, such as a mobile app previously classified as Class I under MDD, which may now be classified as Class IIa or IIb (e.g., Diabetes Management App). This requires additional clinical data, testing, and involvement from the notified body.
Challenge: Many manufacturers are caught off guard by these shifts, especially those with legacy devices or minimal in-house regulatory support.
3.4 Legacy Devices and Retrospective Compliance
Devices already on the market before the MDR came into force may no longer meet current standards, especially in areas such as cybersecurity, software validation, and post-market surveillance.
Challenge: deciding whether to update and re-certify legacy systems (which may require major documentation overhauls) or sunset them, often at significant cost to the company.
3.5 Post-Market Surveillance and Vigilance
Both the FDA and MDR now require ongoing monitoring of device performance, safety, and user feedback. Software anomalies or cybersecurity incidents must be documented, thoroughly investigated, and, in some cases, reported.
Challenge: building scalable monitoring systems that integrate with internal quality processes while maintaining clear traceability between field data, risk files, and software updates.
3.6 Staying Aligned with Constantly Evolving Standards
Regulatory standards in software aren't fixed; they, like IEC 62304 or ISO 14971 for risk management, are regularly updated. Manufacturers must stay current, especially with long cycles or legacy systems that may have become outdated.
Challenge: staying up to date to avoid non-compliance.
3.7 Audit Readiness and the Documentation Overload
As regulators increase scrutiny and audits become more frequent, maintaining audit readiness is essential. This requires maintaining traceability matrices, version-controlled records, and documentation of design decisions, risk assessments, and change management activities to ensure they are up-to-date and accurate. The volume and complexity of this documentation often pose challenges to quality and regulatory teams.
Challenge: increasing volume and complexity of documentation.
4. FDA and MDR Regulations: Conclusion and Call to Action
For medical device manufacturers, complying with medical device regulations is a strategic necessity that impacts market access, patient safety, and brand reputation..
From an executive perspective, ensuring regulatory compliance for software involves the following:
- End-to-end visibility and traceability across the entire software lifecycle: Leadership must ensure that all software activities, from requirements gathering to decommissioning, are documented, traceable, and compliant with regulations. This transparency supports audits and risk management.
- Organisations should follow a structured, well-governed software development process, using a lifecycle-based model documented in a Software Development Plan (SDP). This plan outlines the methodology, quality assurance, risk mitigation, and regulatory checkpoints, ensuring more predictable, repeatable, and compliant development.
- Proven control over software changes and quality: Authorities require evidence of complete control over software assets, including tracking bugs, incidents, patches, updates, and managing configurations. These measures reduce compliance risks, prevent recalls, and ensure device reliability.
Incorporating EU MDR and U.S FDA. Requirements in the software development culture demonstrate leadership's commitment to quality, ensure regulatory approval, and support sustainable innovation in the medical device market.
It's a complex path, but with the right tools, teams, and mindset, it remains accessible and ultimately transformative.
Part 2: Navigating FDA and MDR Compliance: Device Lifecycle Management
1. Definition and Scope
In the regulated realm of medical devices, compliance with FDA and EU MDR regulations is essential for ensuring patient safety, maintaining product quality, and gaining market access. As devices become increasingly software-driven and connected, managing device lifecycle compliance becomes more complex. Device Lifecycle Management (DLCM) involves supervising a device throughout its entire life cycle, from design and development to production, regulatory approval, post-market surveillance, and retirement, covering both technical and quality aspects to ensure the device remains safe, effective, and compliant.
2. FDA Compliance: Total Product Life Cycle (TPLC) Approach
The FDA’s Medical Device Regulatory framework uses a Total Product Lifecycle (TPLC) approach, emphasising continuous oversight from conception to decommissioning. This model includes:
- Pre-market development: Including design controls, risk management, and verification & validation (V&V) activities to ensure safety and effectiveness from the outset.
- Market approval: Securing regulatory clearance or approval through submission of complete and compliant documentation.
- Post-market activities: Ongoing surveillance, complaint handling, and structured change control to monitor performance, address issues, and ensure continued compliance throughout the device’s lifecycle.
3. EU MDR Compliance: Lifecycle and Quality Management
The EU Medical Device Regulation promotes a Lifecycle and Quality Management approach, ensuring medical devices are safe, effective, and monitored throughout their lifespan. This model includes:
- Patient-Centric Risk Mitigation: Clear definition of intended use, comprehensive risk assessments, and clinical evidence supporting safety and performance.
- Technical Documentation and Traceability: Detailed technical files, traceability of all device components, and rigorous risk management for materials and manufacturing processes.
- Clinical Evaluation and Post-Market Surveillance: ongoing clinical assessment, proactive market monitoring, and continuous feedback from real-world experience.
- Quality Management System (QMS): MDR requires a QMS aligned with ISO 13485:2016, covering all aspects of device realisation, production, and service provision.
4. Device Lifecycle Phases under FDA / MDR
Medical Device Lifecycle processes, whether regulated by the FDA or under MDR, follow similar core phases but vary in terminology, documentation, and regulatory oversight. The process involves six phases, starting with the concept and feasibility phase, followed by design and development, verification and validation, submission and approval, production and distribution, and finally, the post-market phase.
4.1 Phase 1: Concept and feasibility
The lifecycle of a medical device begins with the concept and feasibility, where both frameworks require defining the intended use (FDA) or intended purpose (MDR), and conducting a risk-based classification. MDR utilises rules such as Rule 11 for software (Chapter III, Annexe VIII), whereas the FDA employs Product Codes and routes, including 510(k) and PMA.
4.2 Phase 2: Design and Development
During design and development, robust design controls, risk management (as per ISO 14971), and software lifecycle processes (as per IEC 62304) are essential. MDR emphasises showing conformity with GSPR and early clinical evaluation. The FDA focuses on Design History Files (DHF) and tracing user needs and inputs.
4.2.1 The Role of Design History and Technical Documentation
For embedded software, lifecycle documentation must address:
- Version history of firmware/software builds
- Change impact assessments and risk re-evaluations
- Traceability matrices linking requirements, code, and tests
- Archived configurations for each market release
The FDA expects this information to be included in the Design History File (DHF) and Device Master Record (DMR), while the MDR requires a detailed technical file with GSPR mapping.
4.3 Phase 3: Verification and Validation
During verification and validation, whether under the U.S. FDA or EU MDR, the manufacturer must demonstrate that the device meets specifications and is safe and effective. This includes usability engineering (IEC 62366), cybersecurity validation, and software and system verification and validation (V&V). The MDR requires more detailed documentation of clinical benefits and safety, particularly for higher-risk devices.
4.4 Phase 4: Submission and Approval
For submission and approval, a formal FDA premarket submission, such as a 510(k), De Novo, or PMA, or technical documentation for the MDR, is required.
The FDA grants approvals directly, whereas MDR approval involves a Notified Body for all devices except those of the lowest risk. Both systems require UDI assignment and compliance with regulatory labelling.
4.5 Phase 5: Production and Distribution
Once in production and distribution, both the FDA and MDR require manufacturers to maintain a certified Quality Management System (QMS).
The FDA does this under 21 CFR Part 820, while the MDR (Chapter VII) typically complies with ISO 13485. Both must ensure adequate labelling, traceability, and complaint handling. Additionally, the MDR requires registration in the EUDAMED database.
4.6 Phase 6: Postmarket
During the post-market phase, the FDA mandates Medical Device Reporting (21 CFR Part 803), device corrections and removals (recalls) (21 CFR Part 806), and CAPA (21 CFR Part 820.100) under device quality systems (21 CFR Part 820).
MDR stresses ongoing evaluation through Post-Market Surveillance (EU MDR Articles 83–86), Post-Market Clinical Follow-up (EU MDR Article 74), and Periodic Safety Update Reports (EU MDR Article 86).
Both regulators expect manufacturers to react promptly and stay compliant as products evolve.
4.6.1 Configuration and Change Control
For embedded software, configuration management is a vital aspect of the development process. Regulators expect clear answers to questions such as:
- Which version of firmware is deployed in the field?
- What are the dependencies and third-party components?
- How is traceability maintained from source to binary?
4.6.2 Real-world performance monitoring
Software lifecycle management must incorporate real-world performance monitoring, such as:
- Crash analytics and telemetry
- Cybersecurity threat detection
- User-reported issues or usability concerns
5. Device Lifecycle Management: Best Practices
To comply with both FDA and MDR requirements, manufacturers should:
- Develop a Comprehensive Lifecycle Management Policy: Outline procedures for all stages, from design to post-market, and communicate clearly within the organisation.
- Implement a Robust QMS: Ensure the QMS encompasses compliance, documentation, risk management, and continuous improvement, including CAPA, complaints, and vigilance reporting.
- Leverage Digital Tools: Use software for documentation, change management, and real-time monitoring to enhance transparency and facilitate compliance.
- Regular Audits and Training: Conduct frequent audits of device inventory and compliance processes, and provide ongoing training to staff to maintain regulatory awareness.
- Plan for Regulatory Changes: Stay updated on evolving regulations and adapt processes proactively to avoid costly delays or non-compliance.
Part 3: Navigating FDA and MDR Compliance: Embedded Software Updates
1. Introduction
In today’s interconnected healthcare environment, software updates are not just technical adjustments; they are strategic decisions that directly affect patient safety, regulatory compliance, and brand reputation.
Managing software updates under the US FDA and EU MDR demands adherence to design controls, effective risk management, robust cybersecurity measures, and comprehensive post-market surveillance. The complexity escalates for high-risk devices, where software has a significant impact on patient safety.
In this section of the present article, we explore the relationship between embedded software updates and regulatory compliance, emphasising key challenges and how lifecycle management guarantees safety and supports market access.
A case study illustrates updating a hypothetical Class IIb wearable patch that runs embedded Linux.
2. Why Software Updates Matter
As algorithms improve, connectivity expands, and new threats emerge, manufacturers must continually update their embedded software to stay ahead of the curve.
The medical device software is updated to:
- Improve clinical outcomes and provide greater value to users
- Address bugs and usability issues that could impact results.
- Reduce cybersecurity threats in a growingly hostile digital world.
Nonetheless, even minor adjustments can introduce new risks. That’s why both the FDA and EU MDR require formal procedures to evaluate each update.
At the executive level, essential factors to consider include:
- Does the update alter how the device is used or perceived?
- Could new safety or security risks be introduced?
- Will the update require revalidation or recertification?
- Should regulators or customers be proactively informed?
Ultimately, each update is a moment of truth, where innovation aligns with accountability. Getting it right protects patients, ensures compliance, and safeguards the long-term success of your product.
3. The Regulatory Landscape
Both the FDA and MDR regard software, whether standalone or embedded, as a component of a medical device, subject to strict regulation.
3.1 Closer Look at the FDA Perspective
The FDA's regulatory framework relies on 21 CFR Part 820, the Quality System Regulation (QSR), which emphasises design controls, risk management, and change control to ensure device safety and effectiveness. For software, the FDA provides specific guidance, including the following key documents.
- FDA Guidance on Software Modifications: Explains when a software change might require a new 510(k) submission.
- Premarket Cybersecurity Guidance: This document outlines expectations for managing cybersecurity risks throughout the software lifecycle.
- Premarket Submissions for Software Contained in Medical Devices: Outlines the documentation required for premarket submissions, including safety and performance justifications.
These documents outline the circumstances under which a software change necessitates a new 510(k) submission, as well as the documentation required to demonstrate the safety and effectiveness of the change.
3.2 Closer Look at the MDR Perspective
The EU MDR 2017/745 sets higher regulatory standards for medical device software.
- Software is governed independently under Rule 11 (Annexe VIII), with its risk classification based on its intended use and impact.
- Software updates are strategic events: they can change the Basic UDI-DI, shift the risk class, or necessitate renewed Notified Body involvement.
- Regulatory alignment is ongoing: each change must be reflected in Technical Documentation (Annexes II and III), PMS plans, and PSURs.
To stay compliant, manufacturers must ensure:
- End-to-end traceability throughout the software lifecycle,
- Proactive risk management by ISO 14971,
- And implement secure update mechanisms aligned with IEC 81001-5-1.
Bottom line: MDR considers software a standalone medical product, demanding the same rigour, traceability, and regulatory vigilance as hardware.
4. The Compliance Challenge
Updating software in a regulated environment involves far more than simply deploying new code. For medical device manufacturers, each software update can trigger a complex web of regulatory, technical, and quality assurance requirements. Below are the primary challenges they face:
|
Challenge |
Implication |
|
Change Control Complexity |
All updates require impact analysis, traceability, and revalidation. |
|
Risk Management Pressure |
ISO 14971 must be re-applied with every significant change. |
|
Cybersecurity Demands |
Threat models, secure update protocols, and patch transparency are mandatory. |
|
Documentation Overload |
From software architecture to test results, every update must be traceable and auditable |
|
Regulatory Notification Risk |
Uncertainty about when a 510(k) or NB notification is needed leads to delays. |
|
Toolchain Integration |
Ensuring consistency between Jira, Git, eQMS, Jenkins, and Confluence requires mature DevSecOps-QMS alignment. |
5. Lifecycle Management Tools for Compliance
A connected digital toolchain is essential for ensuring end-to-end traceability and audit readiness in regulated software development. Each tool plays a specific role in supporting compliance and streamlining documentation workflows:
- Jira – Manages software work items, defect tracking, and regulatory action items.
- Confluence – Centralises software architecture, system requirements specifications (SRS), usability data, and risk management documentation.
- Git – Controls versioning, branching strategies, release history, and developer signatures for code changes.
- Jenkins – Automates build, integration, and testing pipelines to enforce consistency and reproducibility.
- eQMS (e.g., Greenlight Guru) – Maintains the Design History File (DHF), supports change control, and logs audit trails.
This integrated ecosystem must enable:
- Bidirectional traceability – From requirements and risks to implementation, verification, and release.
- Automated audit reporting – To streamline inspection readiness and regulatory submissions.
- Continuous compliance monitoring – Enabling proactive detection of process deviations or gaps.
6. Best Practices for Regulatory-Ready Software Updates
To guarantee software updates are both practical and compliant with regulatory standards, manufacturers should follow the best practices outlined below:
- Classify updates promptly (e.g., feature, patch, hotfix)
- Maintain traceability matrices that link risks, code, and tests to ensure clear accountability and transparency.
- Update the hazard analysis whenever there is a change to the algorithm.
- Conduct regression testing centred on safety-critical paths
- Plan OTA rollbacks and simulate update failures to ensure a smooth update process.
- Promptly update the Technical Documentation and DHF.
- Engage Regulatory Affairs / Quality Assurance teams during the planning stage.
- Record all safety-related findings in the PSUR and IFU.
7. Embedded Software Updates: Final Thoughts
Embedded software updates are essential for maintaining optimal performance, ensuring security, and safeguarding patient safety. To achieve regulatory compliance, proper design controls, thorough documentation, and a solid grasp of risk management are essential.
Neither the FDA nor the MDR frameworks slows down innovation, but they demand discipline and transparency. By implementing a well-organised software development lifecycle, utilising modern tools, and embracing cross-functional processes, manufacturers can sustain both agility and compliance.
Planning for updates and compliance from the start helps medical device manufacturers build trust, speed approvals, and create safer, innovative healthcare tech.
Part 4: Case Studies — Updates Under FDA and MDR
A software update is considered regulated if it affects the device’s intended use, performance, safety, data processing, clinical outputs, user interface, connectivity, cybersecurity, or involves retraining or redeploying AI/ML models. Such updates are typically classified as major changes, requiring re-verification, re-validation, and regulatory approval.
For this discussion, we will present three case studies —one on epilepsy, the second on kidney disease and the third on wearable patches—featuring high-risk devices regulated by the FDA and MDR. To improve realism, we based these on existing market devices: the NeuroPace RNS and the Automated Peritoneal Dialysis device, both of which are FDA-approved [RNS_FDA] and [APD_FDA], respectively, and Epicore’s Connected Hydration Patch, offering SOC 2 Type II cloud compliance features and hazardous environments (Class I, Div 2) certified.
The software updates in the cases are fictional and intended solely for educational purposes, helping readers understand the device and software lifecycle updates in accordance with FDA and MDR standards.
Before reviewing these use cases, let's revisit a structured summary of best practices for managing device and software lifecycle updates in line with FDA and MDR regulations.
1. Understand the Device & Software Lifecycles
|
Lifecycle |
Description |
|
Device Lifecycle |
Design → Development → Manufacturing → Clinical Use → Post-market Updates |
|
Software Lifecycle |
Planning → Requirements → Architecture → Implementation → Verification → Release → Maintenance (IEC 62304) |
2. Determine the Type of Change
Change Classification & Risk Analysis:
- Conduct a risk assessment to classify the update (e.g., bug fix, UI change, algorithm adjustment)
- Determine whether the update is a minor or major change.
Key Questions:
- Is the software update safety-critical?
- Does it impact clinical functionality, algorithms, communication protocols, or cybersecurity?
Use:
- MDCG 2020-3 Rev.1 for EU significant change guidance
- FDA Guidance: “Deciding When to Submit a 510(k) for a Software Change to an Existing Device”
3. Regulatory Decision Tree
|
Impact Level |
EU MDR (Annex IX/XI) |
US FDA (510(k)) |
|
Minor |
Internal documentation |
No new 510(k) needed |
|
Significant |
NB Notification / New UDI |
Possibly new 510(k) |
|
Major |
New CE Certificate |
New 510(k) required |
4. SELECT Lifecycle Management Tools for Compliance
The following tools ensure traceability, testing, and continuous compliance:
- Jira – Tracks change requests, user stories, and risk items.
- Confluence – Central hub for architectural specs, cybersecurity strategy, and regulatory evidence.
- Polarion – Offers end-to-end traceability across requirements, risks, test cases, and verification evidence, aligned with IEC 62304 and ISO 14971.
- Git – Maintains full code history and release tagging.
- Jenkins – Manages automated testing pipelines and logs.
- eQMS / Greenlight Guru – Supports alignment with regulatory artefacts and design history.
These tools are integrated for:
- Bidirectional traceability
- Real-time change tracking
- Complete audit readiness
Use Case 1: Updating an implantable Responsive Neurostimulator Device.
The device under discussion is a Responsive Neurostimulator System, an implantable electromechanical medical device designed to monitor brain activity and deliver targeted electrical stimulation to prevent or reduce seizures in patients with drug-resistant epilepsy.
1. Device Context Overview
The Responsive Neurostimulator device contains embedded components, including microcontrollers, sensors, stimulators, processors, and secure memory, to monitor and respond to abnormal brain activity. Its embedded software, classified as Software in a Medical Device (SiMD) and Category C under IEC 62304, supports life-saving functions and has an impact on neurological health. Features include real-time EEG analysis, seizure precursor detection, adaptive neurostimulation, and long-term data logging. It may also facilitate data transmission and remote monitoring through secure telemetry, wireless interfaces, or cloud-based systems. The target markets are the US, regulated by the FDA, and the EU under MDR.
Responsive neurostimulator devices are classified as Class III under the FDA (e.g., 21 CFR 882.5800 – Cranial electrotherapy stimulator) and as Class III under MDR Rule 9 (active implantable devices intended to deliver energy to the central nervous system).
In this scenario, we consider introducing a new software update to:
- Enhance responsiveness to atypical seizure onset patterns identified in recent clinical data.
- Integrate behavioural and sleep data from a patient-wearable device to dynamically adapt stimulation thresholds.
This scenario highlights the complexity of implementing algorithm updates in a neurostimulator implanted in the skull, which must ensure patient safety, clinical performance, and full compliance with FDA and MDR regulations.
2. Impact Assessment
This software update introduces significant changes that affect core components:
- Therapeutic Logic: A new algorithm logic alters how seizures are detected and stimulation is delivered, directly affecting clinical performance and requiring formal verification and validation.
- External Data Ingestion: The inclusion of sleep or activity data introduces new communication pathways and increases cybersecurity risk, necessitating robust threat mitigation and data validation strategies.
- User Interface (Clinician Dashboard): Updates to data visualisation, alert thresholds, or patient programming must be captured in human factors engineering documentation and reflected in Instructions for Use (IFU).
3. Regulatory Considerations
UNDER FDA:
- A new 510(k) submission is likely due to the altered seizure detection logic influencing treatment timing and efficacy
- Full traceability from design inputs to verification activities must be maintained under 21 CFR 820.30
UNDER MDR:
- The device’s functionality and intended purpose are affected, triggering a Notified Body review
- Updates required for Technical Documentation, Clinical Evaluation Report (CER), UDI, and PSUR
- A new Basic UDI-DI may be required if the device’s mode of action is altered
4. Software Lifecycle Activities (IEC 62304 Mapping)
|
Clauses |
Activities |
|
5.1–5.3 |
New system requirements and risk assessment are documented in Polarion and traced to user stories in Jira. |
|
5.4 |
The software architecture has been updated to reflect the changes to Therapeutic Logic, External Data Ingestion, and the User Interface (Clinician Dashboard) as documented in Confluence. |
|
5.5–5.6 |
Updated the integration and system-level test suites in Git/Jenkins; these tests include both simulated and actual ECoG data streams, which are documented in Polarion and traced to user stories in Jira.. |
|
7.4 & 8 |
All changes are version-controlled in Git; builds are signed, tested, validated, and release-tagged. |
|
9 |
Full problem resolution and deprecation rationale for legacy algorithm documented and reviewed. |
5. Cybersecurity Integration
- TLS Upgrade: Latest TLS protocols implemented for secure transmission between the implanted device and the external programming system
- System Hardening: Memory protections and sandboxing techniques are applied to isolate the updated algorithm
- Secure OTA Updates: Cryptographically signed over-the-air (OTA) update mechanism for the clinician’s programmer
- Expanded Threat Modelling: BLE vulnerabilities and risks of data interception from wearable integration assessed in updated threat model
Cybersecurity upgrades comply with the latest version of the FDA Premarket Cybersecurity Guidance and MDR GSPR, and are documented in the Software Update File (SUF).
6. Post-Market and Clinical Considerations
The EU MDR 2017/745 & FDA 21 CFR updated as follow:
- Post-Market Surveillance: PSUR and vigilance reports updated (MDR Article 86; 21 CFR 820.198)
- Clinical Evaluation: Ongoing PMCF studies updated with new EEG and seizure classification accuracy data (MDR Annexe XIV)
- Labelling & IFU: Updates to clinician documentation to reflect new algorithm logic and programming features (GSPR 14, 23; 21 CFR 801)
Use Case 2: Updating a Peritoneal Dialysis Cycler Device
A peritoneal device typically refers to equipment used in peritoneal dialysis (PD), a treatment for kidney failure that utilises the peritoneum—the abdominal lining—as a natural filter to remove waste and excess fluid from the blood.
1. Device Context Overview
The device in question is a Peritoneal Dialysis Cycler, an electromechanical medical system that automates dialysis therapy for patients. It incorporates key embedded components, including a microcontroller, various sensors, actuators, and memory modules, to manage and regulate the treatment process. The software controlling the device is embedded, classifying it as a Software in a Medical Device (SiMD), and is considered Class C under the IEC 62304 standard due to its crucial role in patient safety. Main features include automatising dialysis cycles—covering filling, dwelling, and draining phases—while consistently monitoring therapy parameters and recording vital data. Furthermore, the device may include connectivity functions such as data logging and remote monitoring via cloud services, Bluetooth, or Wi-Fi, depending on the configuration. The primary regulatory markets for this device are the United States, regulated by the FDA, and the European Union, under the Medical Device Regulation (MDR).
PD devices are classified as Class II (21 CFR 876.5630 – Peritoneal dialysis system and accessories) under the FDA and as Class IIb (Rule 10 or Rule 22 for active therapeutic devices that administer or remove body fluids) under the MDR.
In this scenario, we consider introducing a new software update to:
- Enable real-time remote monitoring of the therapy sessions via a secure cloud dashboard.
- Trigger clinician alerts when therapy deviates (e.g., incomplete drain cycles, flow anomalies).
This update highlights the complexity of implementing connected features in a safety-critical system, requiring rigorous validation, robust cybersecurity, and compliance with both FDA and MDR standards.
2. Impact Assessment
This software update introduces significant changes affecting key components:
- Communication Module Expansion: adds a telemetry layer to securely transmit session data (volumes, flow rates, alerts) to the cloud, improving data transfer and requiring encryption, latency management, and failure recovery.
- Alert Logic Engine: Adds a real-time layer to detect issues during therapy and notify the care team, but introduces clinical risk requiring careful validation.
- User Interface and IFU: Patients can see new indicators or alerts, and clinicians can access therapy data remotely. These updates need a revised UI design, usability testing, and an updated IFU.
3. Regulatory Considerations
UNDER FDA:
- The new connectivity and alerting features are likely to require a 510(k) because of potential changes in clinical performance impacts. It may influence the device’s safety profile.
- Full design controls must be maintained and updated in accordance with 21 CFR 820.30.
UNDER MDR:
- The added remote monitoring features affect the device’s interaction with external systems and its risk profile, prompting a Notified Body review.
- The technical documentation, clinical evaluation, and the PSUR must accurately reflect these functional extensions.
- A new Basic UDI-DI might be necessary if the added features substantially alter the intended use.
4. Software Lifecycle Activities (IEC 62304 Mapping)
|
Clauses |
Activities |
|
5.1-5.3 |
New system requirements and risk assessment are documented in Polarion and traced to user stories in Jira. |
|
5.4 |
The software architecture has been updated to reflect the changes to the Communication Module Expansion, Alert Logic Engine, and User Interface as documented in Confluence. |
|
5.5-5.6 |
Integration and regression tests were performed, and validation of the alert logic with test cases for both simulated and real events was documented in Polarion, tracing to user stories in Jira. |
|
7.4 & 8 |
All changes version-controlled in Git; builds signed, tested, validated and release tagging. |
|
9 |
Full problem resolution and deprecation rationale for legacy algorithm documented and reviewed |
5. Cybersecurity Integration
- End-to-End Encryption: Securely transmit device therapy data to the cloud using the latest TLS protocols and mutual authentication for enhanced security.
- Zero Trust Framework: Device identity and session-level authentication prevent unauthorised data access.
- Firewall and Access Rules: The device's OS is hardened to restrict open ports and block remote commands, except for secure OTA updates.
- Threat Model Update: New risks such as MITM (Man-in-the-Middle) attacks, data spoofing, and alert flooding have been identified and mitigated.
Cybersecurity upgrades align with the FDA Premarket Cybersecurity Guidance and MDR GSPR 17.4, and are recorded in the Software Update File (SUF).
6. Post-Market and Clinical Considerations
The device update fully complies with EU MDR 2017/745, particularly Annexes I, II, III, and XIV, and conforms to the essential FDA regulations outlined in 21 CFR Parts 820.100, 820.198, 807, and 812, Subpart H.
- Post-Market Surveillance (PMS): The PSUR now encompasses remote monitoring metrics, such as false-positive and false-negative alert rates, alongside real-world data from early clinical deployments. U.S. FDA PMS documents adhere to 21 CFR 820.100 and 820.198.
- Clinical Evaluation and PMCF Reports evaluate the usability, reliability, and safety of remote therapy and are cited in FDA submissions, such as 510(k) or PMA, for traceability.
- Labelling and Instructions for Use (IFU): Updates include remote access setup, alert protocols, and troubleshooting to ensure compliance with MDR GSPRs 14 and 23, as well as FDA 801.
Use Case 3: Updating a Connected Hydration Patch by Adding Sleep-Aware Dehydration Risk Prediction
Let’s consider, in the present use case, a hypothetical software update scenario for the Epicore Biosystems’ Connected Hydration Patch and examine how this update would be managed under both the EU MDR (Regulation EU 2017/745) and the US FDA (21 CFR Part 820, including software guidance) throughout the software/device lifecycle.
1. Device Context Overview
The Connected Hydration Patch is a skin-attached sensor that monitors sweat biomarkers, including fluid loss, sweat rate, and electrolyte levels (especially sodium), using microfluidic technology. It wirelessly sends data to a smartphone, helping athletes, workers, and patients optimize hydration, reducing risks like dehydration and overhydration.
The Epicore Connected Hydration Patch has a layered design combining embedded firmware, mobile apps, and secure cloud platform to provide real-time hydration and temperature data.
The electronics module of the hydration patch operates on low-power firmware to perform sensing, processing, and communication tasks. It controls sensors for sweat rate, skin temperature, and motion, buffers collected data, transmits information via BLE, and activates vibration alerts to signal dehydration, providing users with real-time feedback.
The mobile app, available on iOS and Android, connects to the hydration patch via Bluetooth Low Energy (BLE), displaying real-time hydration and temperature data, alerting users when levels are low, and synchronising data with a secure cloud for analysis, tracking, and reporting.
At the enterprise level, Epicore provides a SOC 2 Type II-certified cloud infrastructure designed to support secure and scalable hydration monitoring.
In this scenario, we consider introducing a new software update to:
- Integrate sleep tracking data to predict the risk of early-morning dehydration.
- Provide personalised pre-sleep hydration suggestions and post-sleep alerts.
The proposed sleep-aware dehydration forecast demonstrates how wearables are evolving into smarter, preventive health tools. Devices now do more than monitor; they manage risks, ensure transparency, and engage users. To innovate responsibly, updates must use validated data, real-world feedback, and robust controls. Incorporating external health data like sleep metrics into medical-grade wearables presents challenges, stressing the need for usability testing, clinical validation, and proper regulation, especially after updates affecting risk alerts and decision support.
2. Impact Assessment
This software update introduces multiple critical changes:
- Prediction Algorithm Logic: The algorithm now includes circadian patterns, sleep duration, and recovery scores to forecast dehydration risk upon waking, introducing new variables and scenarios that require hazard analysis and verification.
- Data Integration Pipeline: The patch and app now accept sleep data from third-party APIs (e.g., Apple Health, Google Fit). This adds dependency complexity, error handling requirements, and privacy obligations.
- User Interface and IFU: Personalised sleep–hydration insights, alerts, and instructions require a redesign of the mobile app interface and updates to the Instructions for Use (IFU). These changes must undergo usability validation and risk traceability mapping to ensure their effectiveness and efficacy.
3. Regulatory Considerations
UNDER FDA:
- The addition of a sleep-based risk engine may trigger a 510(k) if it alters how dehydration risk is calculated or communicated, particularly if it is linked to medical advice.
- The entire update must be documented by 21 CFR 820.30, including requirements, verification and validation (V&V) activities, and design outputs.
UNDER MDR:
- The new predictive feature alters how the device interprets and reports physiological conditions, necessitating a Notified Body review.
- Updates are needed for the Technical Documentation, CER, UDI, and PSUR.
- A new Basic UDI-DI might be needed if the device’s intended purpose is deemed expanded to include sleep-related risk warnings.
4. Software Lifecycle Activities (IEC 62304 Mapping)
The update spans multiple areas in the software lifecycle:
|
Clauses |
Activities |
|
5.1–5.3 |
Requirements for third-party data ingestion and prediction model documented in Polarion and traced to Jira epics and user stories. |
|
5.4 |
The software architecture has been updated to reflect sleep data normalisation, time-based processing, and alert generation logic. |
|
5.5–5.6 |
Test cases simulate both normal and edge sleep behaviour (e.g., sleep deprivation, long naps, device sync failure). Regression and simulation tests include a scenario with incomplete sleep data as documented in Polarion and traced to user stories in Jira. |
|
7.4 & 8 |
All modifications, including prediction logic, data flow modules, and mobile UI components, are version-controlled in Git; builds are signed, tested, validated, and tagged for release. |
|
9 |
Risk control measures for false alerts and over-reliance on sleep insights are documented, along with justifications for the changes. Retired logic documented with justification, risk controls, and benefits |
5. Cybersecurity Integration
- App-Level Permissions Control: Fine-grained permission requests for accessing third-party sleep data; user authorisation is logged and revocable.
- Data Integrity Checks: Sleep data timestamps and sync quality are verified before use in predictions.
- Privacy Risk Mitigation: All imported data is anonymised and stored separately from biometric hydration data.
- Threat Modelling Update: New threat vectors, API hijacking, stale data injection, and mobile app spoofing—addressed in the latest model.
All measures adhere to the latest version of the FDA Cybersecurity Guidance and MDR GSPR.
6. Post-Market and Clinical Considerations
In alignment with EU MDR 2017/745 – Annexes I, II, III, and XIV; and FDA 21 CFR Parts 820.100, 820.198, 807, and 812 Subpart H:
- Post-Market Surveillance (PMS): Updated PSUR includes false alert rates, user complaints, and real-world usage data. For the FDA, surveillance data are logged under 21 CFR 820.198 and 803.
- IFU and App Labelling: New sections describe the role of sleep data, limitations of predictions, and instructions for optimal hydration before sleep. Compliant with 21 CFR 801, GSPR 1, 14, and 23.
- Clinical Evaluation and PMCF: The predictive accuracy, usability, and effectiveness in reducing dehydration events are evaluated through PMCF studies under MDR Annexe XIV and the FDA’s post-market pathways.
7. When Smart Features Require Smarter Compliance
Epicore’s connected hydration system, in its current configuration, is not certified under the EU Medical Device Regulation (MDR) and lacks FDA clearance as a medical device. Existing certifications pertain to industrial safety and data security but do not constitute conformity to EU MDR requirements (e.g., Annexe I, GSPR) or U.S. regulatory frameworks under 21 CFR Part 820. Any extension of intended use that includes physiological monitoring or health-related risk prediction may trigger reclassification under MDR Article 2(1) or the FDA’s Section 201(h) of the FD&C Act.
The hypothetical addition of a Sleep-Aware Dehydration Risk Prediction feature represents a substantial functional enhancement. This change introduces algorithm-based risk stratification using sleep pattern data and hydration metrics, potentially crossing the threshold from a general wellness device to a regulated Software as a Medical Device (SaMD). Under MDR, this may result in a reclassification to Class IIa or higher (as per MDCG 2021-24), triggering complete technical documentation requirements (Annexes II & III) and a conformity assessment via a Notified Body. Under FDA regulations, this modification may necessitate a 510(k) submission or De Novo classification, depending on the presence of predicates and the risk profile.
Given its robust hardware infrastructure and advanced data analytics capabilities, Epicore’s system is well-positioned technically to transition toward regulated medical use. However, such a transition demands a structured approach to clinical validation, regulatory engagement, software lifecycle documentation, and post-market surveillance planning. Continuous monitoring of the product’s regulatory status is essential as predictive features evolve and approach the boundary of regulated clinical functionality.
Final Thoughts: Lessons Learnt
In today’s interconnected healthcare environment, software updates are more than just technical tasks; they are essential drivers of innovation. Whether for diagnostics, monitoring, or therapy delivery, updates are crucial for improving patient outcomes, integrating new clinical insights, and maintaining a device’s competitive advantage.
However, these updates involve regulatory, safety, and cybersecurity risks. Managing them requires a structured, well-documented process that aligns with international standards and regulatory expectations.
By integrating regulatory and design controls into the development lifecycle, including compliance with IEC 62304, robust cybersecurity measures, and comprehensive lifecycle management, manufacturers can innovate with confidence.
A disciplined update process isn’t just about regulatory compliance. It builds market trust, reduces liability, enhances product performance, and positions companies to lead in a rapidly evolving digital health ecosystem.
Annexe
MDR ↔ FDA Regulatory Comparison
Drawing from the Johner Institut article, the table below gives a side-by-side comparison of MDR and FDA regulations, focusing on the practical differences engineers should be aware of.
|
Topic |
EU MDR |
FDA (U.S.) |
Notes |
|
Device Classification |
Classes I, IIa, IIb, III |
Class I, II, III |
Risk-based; Class III = highest risk in both systems |
|
Pre-market Submission |
Annexe II + III (Technical Documentation) |
510(k), De Novo, PMA |
510(k) ≈ MDR Class IIa/IIb. PMA ≈ Class III |
|
Technical Documentation |
Annexe II (core) + Annexe III (PMS plan/report) |
Part of 510(k), De Novo, or PMA files |
Structured under MDR, hence more strict - FDA less strict hence leading to variability |
|
Quality System |
Annexe IX/XI, Article 10(9); ISO 13485:2016 |
21 CFR Part 820 (QSR) |
FDA QMSR update aligning with ISO 13485 expected |
|
Clinical Evaluation |
Annexe XIV (Part A + B) |
IDE (21 CFR 812), PMA, or 510(k) |
MDR requires continuous clinical evidence |
|
Postmarket Surveillance (PMS) |
Annexe III, Article 83–86 |
Part 803, 822 |
EU MDR explicitly defines content, timing, integration, and responsibilities. |
|
Vigilance / Reporting |
Article 87–92, EUDAMED |
21 CFR Part 803, 806 |
Timeframes differ (e.g., 15-day FDA vs 15-day EU) |
|
Labeling |
Annexe I, Chapter III |
21 CFR Part 801, 809 |
UDI required under both |
|
UDI |
Article 27 + Annexe VI |
21 CFR Part 830 |
Largely harmonized with IMDRF |
|
Software Classification |
Rule 11 (Annexe VIII) |
Risk-based |
FDA has digital health guidance |
|
PRRC |
Article 15 |
No direct equivalent |
U.S. requires quality personnel, but not PRRC |
|
Notified Body |
Required for Class IIa/IIb/III |
Not applicable |
FDA acts as centralized reviewer |
|
Declaration of Conformity |
Article 19, Annexe IV |
Not required |
EU requires DoC for CE marking |
|
Market Authorization |
CE Marking |
FDA Clearance or Approval |
PMA = full scientific review |
|
PMCF |
Annexe XIV Part B |
PMA studies or surveillance |
Required under MDR, optional at FDA |
Equivalents Overview
|
EU MDR |
FDA |
|
CE Marking |
FDA Clearance (510(k)), Approval (PMA) |
|
Technical File (Annexe II/III) |
510(k) or PMA Application |
|
Class III (EU) |
PMA (FDA) |
|
Class IIa/IIb (EU) |
510(k) (FDA) |
|
Declaration of Conformity |
Not required in FDA |
|
Notified Body Certificate |
Not applicable (FDA = centralized body) |
Download the PDF
Related resources
Some similar resources you may also be interested in


