Browse Definitions :
Definition

clean room

A clean room (or cleanroom) is an enclosed space in which airborne particulates, contaminants, and pollutants are kept within strict limits. In industry, clean rooms are used in the manufacture and servicing of hardware such as integrated circuits ( IC s) and hard drive s. In biotechnology and medicine, clean rooms are used when it is necessary to ensure an environment free of bacteria, viruses, or other pathogens. In addition, the temperature and humidity may be controlled.

Clean room specifications for particulate matter (such as dust) are defined according to the maximum allowable particle diameter, and also according to the maximum allowable number of particles per unit volume (usually cubic meters). For non-particulate contaminants, the maximum allowable density in terms of microbes per cubic meter, or molecule s per cubic meter, is specified. Four fundamental rules apply to clean rooms. First, contaminants must not be introduced into the controlled environment from the outside. Second, the apparatus within the controlled environment must not generate or otherwise give rise to contaminants (for example as a result of friction, chemical reactions, or biological processes). Third, contaminants must not be allowed to accumulate in the controlled environment. Fourth, existing contaminants must be eliminated to the greatest extent possible, and as rapidly as possible.

In the United States, Federal Standard 209E (FED-STD-209E) was used until the end of November 2001 to define the requirements for clean rooms. On November 29, 2001, these standards were superseded by the publication of ISO specification 14644-1.

This was last updated in May 2006

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close