JifJaff MyBotGP Product Range
Our MyBotGP NHS Cloud range boosts Primary Care productivity by automating critical workflows. 1. Pathology Management (EMIS & SystmOneTPP), 2. Docman Letter Management, and 3. Repeat Prescriptions. MyBotGP frees clinical and admin time, reduces costs, and supports outstanding patient care.
Features
- NHS Cloud delivered as a service SAAS
- Works with EMIS and SystmOne
- Practice and PCN rules
- Remote Log in
- Can bespoke rules at practice (your rules, your way)
- works autonimously 365 days a year
- Accommodate differing lab reports and hospital letters
Benefits
- Enforces additional checks on Pathology & Letters
- Supports setting baseline of checks
- Free clinical time & lowers cost
- Quicker processing of pathology tests, letters and repeat requests
- Improve patient care as you can automate additional checks
- Can sms patients
- Reduces errors
- Free staff to focus on other value-added areas
Pricing
£0.30 a unit
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 7 6 7 5 5 5 1 3 9 4 7 6 0 4
Contact
JifJaff Robotic process automation (RPA) Artificial intelligence (AI) Software consultancy
James Aitman
Telephone: 07956 182256
Email: Enquiries@jifjaff.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No constraints
- System requirements
-
- 1 x Laptop, PC or Virtual Machine
- 1 x Windows login for MyBotGP laptop
- 1 x EMIS/System One/Accurx Credentials
- Internet Connection
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 8 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Severity 1 - Workflow product code that means the workflow does not run.
Response within 8 hours - JifJaff will work with the client to address the issue & will rank this as a priority one for our help desk.
Severity 2 - Automation workflow product, whereby it is functioning in a reduced capacity.
Response within 2 Working Days - JifJaff will work with the client to address the issue & will rank this as a priority one for our help desk.
Severity 3 - Medium-to-low impact error that involves partial or non-critical loss of functionality for production purposes but allows the Automation
workflow to continue to function.
Response within 3 Working Days - JifJaff will work with the client to address the issue & will rank this as a priority one for our help desk. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Purchase a user license (sometimes free trails are also on offer)
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- No user data is held by JifJaff and all contractual data is terminated after 6 months once contract ends
- End-of-contract process
- Usage of the application for 12 months
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Each practice has an independent copy of MyBotGP and runtime is not affected by other users. Run-time is influenced by the practice network
Analytics
- Service usage metrics
- Yes
- Metrics types
- The platform has a reporting dashboard which shows a breakdown of total normal blood tests filed by category over a given period.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
- Not applicable - no data leaves the practice
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- There is a downloadable feature in the platform whereby all blood test filing rules can be downloaded and uploaded
- Data export formats
- Other
- Other data export formats
- Excel
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.9% availability
- Approach to resilience
- Available on request
- Outage reporting
- Application notification & email
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Username & PW set by the practice
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- DCB0129
- OWASP testing
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
- Please request our information security document
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Change Management Framework:
Process Design and Re-engineering
Implementation
Project Management and Communication
Change Management
Change Readiness Assessment
Leadership
Alignment & Buy-in
Stakeholder Engagement
Communication Planning & Execution
Change Request Process
Change board Approval
Meeting occurrences depends on the number and
frequency of change requests.
• Change requests are assessed and prioritized by CAB.
• CAB assesses the Change Request`s impact on the
automation schedule, priories planning, business
process, RPA design.
• Business Owner/ Operations will need to follow
through the solution adopted by CAB.
• CAB Membership: PMs, IT, Sol Arch, Support, BA, with
participation of process owners or SME. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
• JifJaff processes to scan for vulnerabilities in information systems and hosted applications at least annually and when new vulnerabilities potentially affecting the information systems / applications are reported.
• JifJaff process to control privileged access to vulnerability scanning tools and vulnerability reports.
• JifJaff to analyse vulnerability scan reports and results from security control assessments.
• JifJaff remediate identified vulnerabilities in accordance with JifJaff assessment of risk.
• Penetration Testing - JifJaff conducts penetration testing exercises on an annual basis, either by use of internal resources or employing an independent third-party penetration team. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
• JifJaff has a process and tools to maintain detailed records of information security incidents that occur in external (e.g., boundary systems) and internal information systems.
• JifJaff implement a policy to require personnel to report suspected information security incidents to the incident response team and/or JifJaff leadership. - Incident management type
- Undisclosed
- Incident management approach
-
• JifJaff develop, document, and publish an incident response policy that addresses scope, roles, and responsibilities, internal coordination efforts, and compliance.
• JifJaff establish formal, documented procedures to facilitate the implementation of the incident response policy and associated incident response controls.
• JifJaff reviews and update the incident response policy and procedures on an annual basis.
INCIDENT RESPONSE PLAN -
JifJaff implement an incident response plan to establish a roadmap for implementing incident response capabilities
Establish a roadmap for implementing incident response capabilities;
Establish metrics to help ensure incident response capabilities remain effective; and
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Provide time back to doctors and clinicians to focus on more complex tasks
Pricing
- Price
- £0.30 a unit
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- 6 week free trial