JifJaff MyBotGP Product Range
JifJaff MyBotGP is a Desktop Automation (RPA) application that automates the Windows Desktop user interface to action various processes using configured rules within EMIS and System One.
Features
- Clinicians can configure their own Blood filing rules
- Reporting Dashboard Analytics
- Full Audit trails of all Blood Tests filed
- Schedule MyBotGP to run anytime
- Send Text messages to patients
- MyBotGP “Learning” capability to deal with all pop-ups
- Securely reads all lab reports and applies rules
- Accommodate differences in approach by Clinician
- Accommodate differing laboratory report nuances
Benefits
- Clinically driven automation
- Provides clinicians more time for complex tasks
- Up to 70% of tests normal and can be automated
- One hour to install and configure
- Improve patient service
- Reduce the cost to administer
- Provide instantaneous capability to scale at busy times
- Free staff to focus on other value-added areas
Pricing
£0.30 a unit
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 7 6 7 5 5 5 1 3 9 4 7 6 0 4
Contact
JifJaff Robotic process automation (RPA) Artificial intelligence (AI) Software consultancy
James Aitman
Telephone: 07956 182256
Email: Enquiries@jifjaff.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No constraints
- System requirements
-
- 1 x Laptop, PC or Virtual Machine
- 1 x Windows login for MyBotGP laptop
- 1 x EMIS/System One/Accurx Credentials
- Internet Connection
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 8 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Severity 1 - Workflow product code that means the workflow does not run.
Response within 8 hours - JifJaff will work with the client to address the issue & will rank this as a priority one for our help desk.
Severity 2 - Automation workflow product, whereby it is functioning in a reduced capacity.
Response within 2 Working Days - JifJaff will work with the client to address the issue & will rank this as a priority one for our help desk.
Severity 3 - Medium-to-low impact error that involves partial or non-critical loss of functionality for production purposes but allows the Automation
workflow to continue to function.
Response within 3 Working Days - JifJaff will work with the client to address the issue & will rank this as a priority one for our help desk. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Purchase a user license (sometimes free trails are also on offer)
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- No user data is held by JifJaff and all contractual data is terminated after 6 months once contract ends
- End-of-contract process
- Usage of the application for 12 months
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Each practice has an independent copy of MyBotGP and runtime is not affected by other users. Run-time is influenced by the practice network
Analytics
- Service usage metrics
- Yes
- Metrics types
- The platform has a reporting dashboard which shows a breakdown of total normal blood tests filed by category over a given period.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
- Not applicable - no data leaves the practice
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- There is a downloadable feature in the platform whereby all blood test filing rules can be downloaded and uploaded
- Data export formats
- Other
- Other data export formats
- Excel
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.9% availability
- Approach to resilience
- Available on request
- Outage reporting
- Application notification & email
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Username & PW set by the practice
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- DCB0129
- OWASP testing
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
- Please request our information security document
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Change Management Framework:
Process Design and Re-engineering
Implementation
Project Management and Communication
Change Management
Change Readiness Assessment
Leadership
Alignment & Buy-in
Stakeholder Engagement
Communication Planning & Execution
Change Request Process
Change board Approval
Meeting occurrences depends on the number and
frequency of change requests.
• Change requests are assessed and prioritized by CAB.
• CAB assesses the Change Request`s impact on the
automation schedule, priories planning, business
process, RPA design.
• Business Owner/ Operations will need to follow
through the solution adopted by CAB.
• CAB Membership: PMs, IT, Sol Arch, Support, BA, with
participation of process owners or SME. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
• JifJaff processes to scan for vulnerabilities in information systems and hosted applications at least annually and when new vulnerabilities potentially affecting the information systems / applications are reported.
• JifJaff process to control privileged access to vulnerability scanning tools and vulnerability reports.
• JifJaff to analyse vulnerability scan reports and results from security control assessments.
• JifJaff remediate identified vulnerabilities in accordance with JifJaff assessment of risk.
• Penetration Testing - JifJaff conducts penetration testing exercises on an annual basis, either by use of internal resources or employing an independent third-party penetration team. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
• JifJaff has a process and tools to maintain detailed records of information security incidents that occur in external (e.g., boundary systems) and internal information systems.
• JifJaff implement a policy to require personnel to report suspected information security incidents to the incident response team and/or JifJaff leadership. - Incident management type
- Undisclosed
- Incident management approach
-
• JifJaff develop, document, and publish an incident response policy that addresses scope, roles, and responsibilities, internal coordination efforts, and compliance.
• JifJaff establish formal, documented procedures to facilitate the implementation of the incident response policy and associated incident response controls.
• JifJaff reviews and update the incident response policy and procedures on an annual basis.
INCIDENT RESPONSE PLAN -
JifJaff implement an incident response plan to establish a roadmap for implementing incident response capabilities
Establish a roadmap for implementing incident response capabilities;
Establish metrics to help ensure incident response capabilities remain effective; and
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Provide time back to doctors and clinicians to focus on more complex tasks
Pricing
- Price
- £0.30 a unit
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- 6 week free trial