Folding Space Pathology Record Manager (PRM)
PRM enables the scanning of all types of forms & paper documents, the ingestion of digital files into one system via automated workflows. It includes intelligent barcode recognition, easy application of metadata plus instant search, retrieval & viewing over the network from within existing LIMS, PAS, EPR, Clinical or Portals.
Features
- Scanning of Pathology Request Forms and associated materials
- Intelligent barcode recognition with verification & authorised user editing
- Automated recognition & tagging of the Laboratory Number (from Barcode)
- Automated routing of the tagged scans to the PRM
- Network search & retrieval via Laboratory Number and/or metadata
- Easy application of any chosen metadata (e.g.Patient Details, GP Details)
- Extends to any other scanned or digitally generated files/documents
- Across network search & retrieval via Laboratory Number and/or metadata
- Bi-directional HL7 integration with Clinisys ICE Order Comms
- Automated processing of structured HL7 output from Order Comms systems
Benefits
- Instantly reduces paper storage space and greatly improves process efficiency
- No limit to the number or volume of scans generated
- No limit to the number or volume of documents
- Reduces administrative overhead/clinical risk - no need to re-key
- Significantly more affordable than any alternative
- Very intuitive and easy to use with minimal learning curve
- Users become adept very quickly & adoption is fast
- Big Button scanning user experience - fast & foolproof scanning
- Automated workflow from PC's & Scanners into the PRM Repository
- Incredibly fast search, find, filter, retrieval & viewing of information
Pricing
£9,000 to £25,000 an instance a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 0 4 8 0 2 6 8 1 9 3 1 5 7 2
Contact
Microports.Net t/as Folding Space
Ian Sherratt
Telephone: 0121 236 8979
Email: ian.sherratt@foldingspace.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Folding Space have integrated with: Clinisys (WinPath, MasterLab and Enterprise) .
Optional Microsoft Office integration, as well as mail merge via MS Word templates. - Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
-
PRM includes a systems administration tool which enables constraints and restrictions on functions to be enforced.
There is no limit to the file size as our PRM can ingest any file size. Storage provision is subject to consultation with the customer and, presumably, any customer budget or infrastructure constraints, in an on-premises installation or with the Public or Private Cloud supplier. - System requirements
-
- Server running Windows 2022
- Server should be IIS Enabled
- Server should have a minimum of 16GB RAM
- Server CPU should have 8 available cores
- End User PC's should have 2Ghz processer and 2GB RAM
- End User PC's require a modern web browser
- Scanner (optional) should have TWAIN driver
- Server can be Virtual or Physical
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
As a Standard Operating Procedure, Folding Space provides its customers and/or partners with unlimited remote support
via the online Customer Support Portal and via fax, email & telephone to the Partner or Folding Space as appropriate during standard UK office hours. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Folding Space Customers utilise our Support Portal for Technical Support, the portal is managed by our technical and support management and available online (24 x 7).
Once logged and escalated all calls are reviewed, triaged, categorised and worked towards resolution in line with the agreed Service Level Agreement (SLA). Telephone and email support are also provided; typically during normal business hours with out-of-hours escalation relevant to the SLA threat/support level.
For response times, aligned with ITIL recommendations, we would work with the Customer to identify ‘business critical’ application processes (such as data entry or retrieval) and agree acceptable response times for these (excluding environment and network latency) which are then measured and analysed in quarterly service review meetings.
Where necessary any failure to comply with these measurements can then automatically invoke high priority support cases. For example; Priority 1 and 2 incidents - severe system disruptions - are typically measured by a one-hour response and four-hour resolution maximums. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Initial engagement includes mapping of the 'As-Is' processes and agreeing the 'To-Be'. Fixed fee final costs are submitted and a Project Plan is agreed. Folding Space take an Agile approach to project management. The risks & issues associated with the project flow from the weekly RAID teleconference. All implementations are run in accordance with Prince2 and milestones for quality control, and review, are managed during implementation.
An Agile approach to solution delivery requires a collaborative working relationship where iterative deliverables, user feedback and testing within an open and honest communications environment are an integral part of the process.
During the pre-Go Live phase, this iterative & collaborative process will be facilitated and supported by the provision of an online, secure & dedicated Customer Support Portal.
The Customer Portal is the customer facing half of our Company Communications & Support Portal which is also used internally by the technicians committed to the project and which is reviewed and authorised by our Technical and QA Management with escalation to the relevant Director.
Folding Space offer both onsite systems training for authorised System Administrators as well as ‘train the trainer’ for end user training. All training materials are provided in an editable form. - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
-
Upon contract cessation or a termination event, we would provide a machine readable copy of all data/metadata held in the PRM Repository (e.g. CSV or XML) plus open access to the File Store holding the documents (i.e. as PDF/As or TIFFS and in original Source Format).
Folding Space will work with the Customer and agree an exit plan to ensure continuity of service. Upon request Folding Space will help to migrate documents and data to a replacement supplier in line with the exit plan. Folding Space will ensure that the additional exit plan clearly sets out the methodology for achieving an orderly transition of services.
The exit plan will set out full details of timescales, activities and roles and responsibilities of the Parties for:
● the transfer of any technical information, instructions, manuals and code reasonably required to enable a smooth migration
● the strategy for export of data and documents to replacement supplier, including conversion to open standards or other standards as required
● the transfer of Project Specific IPR items and other customisations, configurations and databases
● the testing and assurance strategy for exported documents and data - End-of-contract process
-
The Customer is able to terminate the contract, after the minimum term (2 years) by giving notice to the Company within the first nine months of any year following the renewal anniversary; that is, within the nine months following the Annual Renewal which is every twelve months from the Commencement date. Termination will then occur in the twelfth
month following the Renewal Anniversary.
We would agree an exit plan to ensure the secure and safe export of the Customer’s data & documents from our PRM and co-operate in any migration support.
Typically we would provide a machine-readable copy of all data/metadata held in the PRM Repository (e.g. via CSV or XML) plus open access to the File Store holding the documents (i.e. as PDF/As or TIFFS and in original Source Format).
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
-
We have our scanning product called Scan Manager which is a UI that enables our highly intuitive 'Big Button' interface. Its simplicity allows the user to quickly select scanning options picked from a preconfigured selection arranged for each customer need.
We also allow scans to be viewed in our software though the SUV user interface should that be necessary. - Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- None.
- API
- Yes
- What users can and can't do using the API
-
We have a complete library of API, Invocation and Rendering Web Services available to ensure all manner of interfacing, integration and data exchange with other applications. And we have a philosophy of ‘open schema’ sharing of our database approach with our Customers so that customer IT can collaboratively access and utilise the database themselves.
We have extensive experience in integrating information with other applications; specifically, various PAS (Patient Administration System), Microsoft Active Directory (we have an MS AD management technology), LIMS (Pathology Laboratory Information Systems), Care Systems (e.g. CareFirst), Email (we possess extensive MS Exchange interaction technologies) and all manner of data warehouses (e.g. from SQL and Oracle to SAP). - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- A range of LIMS integrations are possible (see section relating to this) as well as a choice of scanners, for different lab applications based on paper volumes in order to manage volume efficiently and appropriately.
Scaling
- Independence of resources
-
We provide a dedicated, (physical or virtual) server & storage cluster per customer rather than a multi-tenant cloud based service. This improves security, system management and offers guarantees in performance. Folding Space software is developed with industry standard scalable Microsoft.NET Framework and SQL database server technologies.
Extensive Performance and Load tests are performed to ensure that our systems are both resilient and scalable. C# is used to program WCF Web Services, ASP.NET websites, and rich HTML5 user interfaces.
PRM provides for horizontally scalable solutions which support multi-nodes at application and data levels for the highest levels of security and integrity.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- PRM system administration also enables the batch exporting of documents and records.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Xml
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- Xml
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
-
CPA Foundation VPN Gateway
TLS (HTTPS or VPN) version 1.2 or later
Legacy SSL or TLS (HTTPS or VPN) - Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Managed Hosting Service Level Agreement: Service Availability will be as per the (customer preferred) cloud vendor SLA (e.g. Microsoft Azure at 99.95%). Private cloud will be in compliance with the UpTime Institute's Tier III availability 99.982%. The PRM design approach includes a proposed multi-node load balanced environment at the application level with no single points of failure to meet the SLA's. Maintenance and upgrades are always planned and scheduled in partnership with the Customer and designed so as to avoid or minimise downtime. The multi-node load balanced approach enables individual application servers to be taken out of the load balancer for upgrades or maintenance on a staged basis.
- Approach to resilience
-
Externally: independent penetration tests, security tests and performance tests have been successfully undertaken by customers such as Her Majesty's Courts Service, House of Commons, Foreign and Commonwealth Office, IPSA (Independent Parliamentary Standards Authority), Scottish Parliament and the Welsh Assembly as well as various NHS Trusts and Local Authorities.
Internally: PRM automatically audits every user interaction including date/time, user, device and audit action type and audit action description.
Software maintenance of PRM by Folding Space does not normally touch upon the data or documents.
Updates/upgrades are planned and deployed to a test environment before going live.
We secure all data exchanges via HTTPS or SFTP. Our ‘thin’ client-side approach to data & document exchange means that data integrity and security is maximised as nothing is transferred from the secure server-side; it is merely accessed and viewed (i.e. not stored locally). - Outage reporting
-
The PRM Customer Support Portal includes a facility for automated alerts sent to the Customer and to internal designated staff responsible for resolving support issues. This Portal provides a complete environment for feedback & communications incorporating an incident logging, triage response and issue/fix monitoring service; effectively, a complete structured, threaded and audited case management & acceptance testing system.
The Customer Support Portal is also used internally by the technicians committed to the project and which is reviewed and authorised by our Technical and QA Management with escalation to the relevant Director.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
EDM includes a Security Oversight Programme which enables administrators to grant access rights, privileges and permissions for individual users and groups of users based upon any document or record metadata attribute as well as against specific documents and records where metadata is not a reliable identifier for application of security.
In addition to standard permit/deny access levels EDM also provides a Break Glass facility whereby users who do not have access by default but can request access in emergency which is automatically granted for 60 minutes, and an audit alert recorded for the Break Glass instance. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Citation
- ISO/IEC 27001 accreditation date
- 16/05/2019
- What the ISO/IEC 27001 doesn’t cover
- Nothing
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Folding Space systems are designed, built, operated and tested by Prince2 and ITIL accredited practitioners to ISO 9000 and ISO 27001 quality assurance procedure standards. We are ISO 27001 Certified.
PRM supports complete document & record management in compliance with all national standards & guidelines, including the NHS and HMRC and other similar UK standards like:
Cabinet Office: e-Government Metadata Standard
JISC Digital Media: Directory of Metadata Schemas and Related Standards (Higher Education)
The National Archives: Electronic Records Management Systems - Metadata Standard - Information security policies and processes
-
Folding Space ISO27001 ISMS Policy document available upon request.
An Information Asset Register (IAR) for logging and tracking the receipt and usage of 3rd Party Data is maintained by Folding Space. The National Archives IAR template has been extended and is used by Folding Space in recognition of the nature of the Folding Space business and the diversity of data received from various 3rd Parties (e.g. customers, partners.)
The Folding Space Compliance Manager is responsible for the creation, maintenance and monitoring of the Information Asset Register.
The intended recipient of any information asset supplied from outside the company is responsible for pre-receipt alerting and registering the asset with the Compliance Manager immediately upon receipt.
The Folding Space Technical Manager or Project & Support Manager are responsible for the secure access, deployment and storage of each information asset.
Information assets can only be accessed by individuals that have appropriate authorisation according to the classification of the information and their need to access for work purposes.
The Technical Manager or Project & Support Manager are responsible for the return or destruction of the information asset as determined by the Compliance Manager and in agreement the relevant Asset Owner.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All CCN's are logged in the Folding Space Customer Support Portal . An Account Manager ensures continued direct liaison and communications between all parties. We assign an accredited Prince2 Practitioner for the full project lifecycle and ongoing support, as well as assigning a Director of the company to undertake strategic and overall responsibility for the project.
All these measures fully support the establishment and successful operation of an ITIL-aligned Change Request & Control process. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Risk management is aligned to ISO27001 and is driven from Board level. Regular vulnerability testing identifies potential threats, vulnerabilities and mitigates risks through appropriate controls to reduce the risks to people, information and infrastructure to an acceptable level. This process takes full account of relevant statutory obligations and protections, including the Data Protection Act, Freedom of Information Act, the Official Secrets Act, Equality Act and the Serious Organised Crime and Police Act.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Technical support is provided as per the agreed SLA. System and software support is provided via system health monitoring and in response to feedback received via the Support Portal.
In an on-premise installation, remote diagnostics and operational technical remedial investigation/action is provided.
In a Managed Hosted Service we monitor Firewall CPU, Memory, network interface utilisation, system disk usage, port status for Windows services and Ping monitoring and, if thresholds are exceeded, generate an automated support ticket. In addition, we also configure a URL monitoring check.
Typically, penetration testing cycles are agreed with the Customer for the duration of the contract. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Incidents are managed via the Customer Support Portal.
Once logged and escalated all calls are reviewed, triaged, categorised and worked towards resolution in line with the agreed SLA.
Folding Space agree acceptable response times for business critical application processes with the Customer, these are then measured and analysed in quarterly service review meetings. Any failure to comply with these measurements automatically invokes high priority support cases.
A management escalation procedure is also agreed to ensure that issues requiring direct management intervention are in place. Typically, this encompasses invocation of a chain of command, emergency and out of hours contact facilities.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
We employ people based on their abilities skills, and values irrespective of their gender identity, race, religious or political beliefs.
Pricing
- Price
- £9,000 to £25,000 an instance a year
- Discount for educational organisations
- No
- Free trial available
- No