Care Cloud
A modern, cloud-based Care Business Management system including facilities for Care Planning, Invoicing for Service Users, Recruiting, managing & Rostering Staff and calculating Payroll. All within a secure and flexible platform including reporting and dashboard capabilities. A companion Mobile App also enables Carers to record Care delivery.
Features
- Care Management
- Mobile "Point of Care" recording
- Invoicing
- Applicant & People Management
- Intelligent Rostering
- Quality & Compliance
- Payroll
- Dashboards & Business Insight
Benefits
- Real-time, personalised graphical dashboards for quick oversight.
- Intelligent rostering and rota-planning calculate pay
- Creation of assessment form, mirroring paper-based documents
- Dedicated point-of-care apps, built with user in mind
- Flexible-invoicing facilitates the complex, like split funding or shared care
- Calculating gross payroll for multiple employee contracts
- SaaS technology, no requirements for customer installation or maintenance
- Utilising AWS, ensuring reliability and the highest levels of security
Pricing
£46.80 to £528.00 a user a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 7 8 8 8 0 0 6 1 0 7 7 6 3 9
Contact
Advanced Business Solutions
Bid Support
Telephone: 0330 343 8000
Email: bidmanagementteam@oneadvanced.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Our Care Solution cannot be used without Multi-factor Authentication (MFA) enabled.
- System requirements
-
- PC - Operating system - Windows 10 & 11
- PC - Web browser - Chrome, Edge
- PC - Internet connection & access
- Tablet - Operating Systems - iOS v15+, Android v12+
- Tablet - Browser - Safari (iOS), Samsung Internet (Android)
- Mobile Phone - Recommended iOS v15+, Android v12+
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Target Response Times
P1 - 1 hour
P2 - 4 hours
P3 - 8 hours
P4 - 24 hours - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Target Response Times
P1 - 1 hour
P2 - 4 hours
P3 - 8 hours
P4 - 24 hours - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Advanced follow Prince2 Project Methodology. A Project Manager is assigned to the customer. At the stakeholder engagement meeting all documentation re the service is shared between stakeholders. Project plan is created aligning each task to a responsible owner. RAID log is shared with the customer and managed throughout
The customer will be provided with a sandpit environment for familiarisation/testing activities. We will jointly work on the project deliverables through to successful completion.
The customer will be provided with a suite of eLearning modules as well as virtual classroom sessions relevant to what the customer will utilise.
Upon training completion, the customer will receive 1:1 consultancy session’s. These will guide the customer through the process and provide ongoing support before a go live takes place.
Following successful user acceptance testing the customer will commence with a pilot go live for a subset of users/services for any operational issues to be addressed and the system to embed prior to a full go live.
Two-four weeks after your go live date, we will work to signoff the project off once satisfied. At this remote meeting, we will formally introduce your Account Manager/Customer Support/Customer Success Team(s) who will become your primary points of contact. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
There is no full data export that a user can invoke however, there are several options that can be discussed and explored with the customer to suit their needs, note that not all options below are available to all customers.
Right To Use License
Provision of a Database Backup (.BAK file), provision of SQL scripts to extract data and instructions on how to restore the database and use the scripts.
Advanced Extract of Data and provision in the form of .CSV files.
Provision of SQL scripts to extract data and instructions on how to use the scripts. - End-of-contract process
-
Upon termination of contract, we will work with the customer/new supplier to prepare an Exit Plan which sets out the proposal for achieving an orderly transition of Data.
We will outline the approach to exist planning:
- Scope of data/extraction format
- Transfer mechanism to customer/new supplier
- Number of extracts provided for data validation
- Agree a retention period, following which Advanced will securely wipe all data from the Advanced systems
A commitment to developing a transition plan with the customer/new supplier at least 3months before the transition date (unless agreed otherwise)
Advanced will work with the customer/new supplier to ensure continuity of data for care provision. This will be detailed in the jointly agreed Exit Plan, normally including:
- Defined timeline with clear definition of ownership/responsibilities
- Defined agreement and approach to the number/scope of any trial data migrations.
- Defined approach to how the data will be encrypted/transferred, and unencrypted.
- Definition and agreement of any dual-running activities which may be required during transition to ensure continuity of data for care.
A clear approach to exporting data from the system in an encrypted electronic format enabling upload into a new system containing the full set of data.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The main Solution, browser based application runs on mobile and touch screen devices with a minimum screen size of 10in. This includes Android/iOS/Windows/Mac devices.
A Mobile App is available which is designed to run on iOS/Android Mobile phones with a smaller screen. The Mobile App does not include the full feature set of our Care Solution and is focused on the recording of interactions, Care Staff, at the "point of care" e.g. recording Personal Care/Preparation of Food/Medication Administration. The Mobile App can be used in settings including Supported Living/Residential /Nursing Care homes/Domiciliary Care. The App also works online/offline where necessary. - Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
-
Users work with a modern browser either desktop or Mobile to use the service.
The companion Mobile App, for use on smaller mobile devices such as Phones, uses a dedicated App, available from the App Store and Google Play Stores for the iOS and Android versions respectively. - Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
The user interface of our Care Solution is developed with Accessibility-First Design principles adopted.
Our component library and design system (Mosaic) both adhere to WCAG AA 2.1 standards out of the box. So, any product that adopts them into their products will also inherit and pass on these benefits of a fully accessible site to their users. - API
- Yes
- What users can and can't do using the API
-
Our Care Solution includes open APIs enabling integrations to be developed with multiple other systems.
The solution utilizes the ASP.NET Web API framework to build HTTP RESTful services that reach a broad range of clients. It uses HTTP methods (mainly GET, POST, PUT, and DELETE) to communicate with the client. The Web API services allow other systems to request data if they have the correct security and authorisation. Using Web API our solution will return the results in JSON format.
Documentation for the APIs is comprehensive and entirely contained within the setup screens of the Care Solution itself. - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
User organisations can customise our Care Solution in many ways:
1. Live Dashboards can be defined to visualise, using lists and charts, the data within the system. This enables Users to quickly assimilate what requires their attention.
2. Workflows can be configured to automate parts of a local business process or add additional validation rules.
3. Pathways can be defined that allow the organisation to systematise their business processes.
4. A digital forms designer enables the organisation to build and maintain data capture forms, including logic for quicker navigation or calculations.
5. Reference Data lists can be adapted to include locally defined options.
6. Home screens composed of collections of dashboards can be defined for use by different User roles.
7. Role Based Access Control can be defined locally using Security Profiles to govern precisely what Users can see and do within the system to suit their role.
Scaling
- Independence of resources
-
The solution is built upon a highly scalable public cloud platform (Amazon Web Services) that has a near infinite amount of resource due to the size of its network infrastructure. The platform is multi-tenanted and is never limited to a single machine/data-centre, working across all available zones.
The system will automatically allocate more resource if required, and downscales when no longer required, without disruption to those currently using the solution.
For example, if the solution had 10,000 active users, processing power, RAM/storage and network bandwidth would scale to match system demand, then automatically lower if 5,000 users were to log-off.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
System User access reports are available from within the system along with comprehensive System Audit Data (every View, Create, Update, Delete etc).
Infrastructure is monitored in real time with proactive monitoring ahead of agreed thresholds being breached, whereby incident management action is triggered. - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
There is no full data export that a user can invoke however, there are several options that can be discussed and explored with the customer to suit their needs, note that not all options below are available to all customers.
- Provision of a Database Backup (.BAK file), provision of SQL scripts to extract data and instructions on how to restore the database and use the scripts.
- Advanced Extract of Data and provision in the form of .CSV files.
- Provision of SQL scripts to extract data and instructions on how to use the scripts - Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Our internal target is an availability of 99.5% (excluding pre-organised maintenance).
- Approach to resilience
-
The AWS platform provides us with the tools required to utilise a highly resilient configuration, allowing the environment to be robust without single points of failure. All services are distributed across AWS availability zones, and are serviced via load balancers to ensure resilience of the network.
This approach is consistent across all application tiers and ensures that a single server or a whole data-centre becoming unavailable will have minimal impact on service availability i.e. if one server fails, the traffic will be automatically routed to a different server in a separate region which will mean no downtime. - Outage reporting
-
When an outage or an issue that could potentially impact users is noticed, all applicable customers are informed via email or phone dependant on impact & severity.
Customers are also able to directly call our service desk (both in and out-of-hours) to report any availability issues.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Access control is in place both internally and across our solutions, following a policy of minimal access whereby employees are only given the required permissions to perform their relative function, this includes, restriction to confidential information. We advise all of our customer base to follow a similar policy, regarding user access and privilege management of the provided solution.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 30/06/2021
- What the ISO/IEC 27001 doesn’t cover
- All G-Cloud activity is covered by the certification.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70).
- SOC 2 & 3.
- FISMA.
- ISO 9001 / ISO 27001.
- ITAR.
- FIPS 140-2.
- MTCS Level 3.
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Access control is in place both internally and across our solutions, following a policy of minimal access whereby employees are only given the required permissions to perform their relative function, this includes, restriction to confidential information. We advise all of our customer base to follow a similar policy, regarding user access and privilege management of the provided solution.
We have a dedicated Talent team who produce courses with current regulation and best practice in mind. These are mandatory for all employees to undertake (e.g. GDPR compliance, vulnerability & viruses management, data handling & breaches, etc..) before they are allowed to carry out their function. Additional courses (e.g. clinical training, PID management, legal assessment, etc.) are also in place for those in the applicable sector. Courses are renewed when applicable, or annually at a minimum.
Risk management processes are in place, whereby incidents found or reported are assessed based on impact and severity. Depending on the assessment, applicable actions may be taken as laid out in our ISMS, Disaster Recovery and Business Continuity policies. Escalation paths are provided and can be used as needed.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
As a SaaS offering, we apply applicable security or application updates during pre-agreed maintenance windows. For updates, customers are provided with release notes. For security, customers are informed if there's an adverse effect on their system or data, updates would relate to the underlying cloud infrastructure.
Other changes will not be performed outside a regular monthly maintenance window, unless authorised by the customer. E.g., if users are required to temporarily stop use while technicians run a script to resolve an issue, then we advise an authorised party of the scope, impact and agree a time to carry out the work. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Incidents found or reported are assessed based on impact and severity. Depending on the assessment, applicable actions may be taken as laid out in our information security management system (ISMS), Disaster Recovery, and Business Continuity policies.
Customers will be informed as soon as possible if any of these policies are enacted, with an ongoing channel of communication between setup. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Manual and automated alerting is in place to monitor performance, security, unauthorised access, or potential data breaches. If an issue were found that may impact customers, or be of a certain severity, they would be informed as soon as possible.
Retention time of audit logs the solution are user-definable, however, audit logs of the platform (such as network requests, database access, API usage, etc..) and are kept for the duration of the platforms existance, and can be used to investigate issues. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- OneAdvanced Incident-Management align with ENISA Good practice Guide for end-to-end processes and simplified down to Detect, Analyse, Contain, Eradicate, Recover. Our security tech-stack provides analysis of data consumed by security team and identifies potential-incidents. An analyst then reviews, analyses output. If validated, Incident is raised and Security team move to Contain the Incident supported by number of predefined Playbooks. Once contained, the Incident is moved to Eradication-phase, any malicious software/connections are removed. The Recover-phase lead by service-operation team supported by security and post-incident review conducted to identify preventative actions required. Incident is managed through case management system to govern progress.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We are committed to building a better tomorrow for our staff, customers and wider community through outstanding environmental sustainability performance. Our vision is underpinned by five core principles:
To protect the environment by reducing our carbon footprint
To reduce the environmental impact of our operational activities through effective management of our estate
To create and maintain a positive environmental sustainability culture
To maximise the positive impact of our sustainability actions through effective communication, collaboration and partnership
To fulfil all environmental compliance obligations and seek to exceed regulatory requirements
To achieve this vision, we continuously invest in and develop our ESG strategy to provide a structured and meaningful approach to our climate activity. Our success also relies on effective engagement with staff, utilising and developing their skills, knowledge and understanding.
We have launched a number of initiatives to reduce our GHG emissions on an annual basis, since 2018 we have seen a reduction in 36% in our total GHG emissions.
We are proactive in the property management of our offices, maintaining pressure on landlords and staff to ensure energy efficiency. Home working is facilitated and encouraged, and unnecessary travel is minimised by the delivery of consultancy, training and implementation services remotely, where appropriate. Reducing the amount of paper we generate is a key focus, and we use recycled paper - which we then recycle ourselves. We have also taken steps to recycle other materials such as plastics, food and cardboard. We comply with WEEE regulations and recycle our electrical items. All our UK based offices are entirely using green electricity and we have undertaken an office consolidation project to minimise unnecessary carbon expenditure.
We are focused on our transition to a Cloud service company ensuring our customers have solutions which are future proofed and don’t require costly or energy inefficient hardware.Covid-19 recovery
In the event of a similar incident OneAdvanced has a documented Health and Safety policy regarding Covid-19 Arrangements, which focuses on handwashing, hygiene, self-isolation and social distancing.
As part of our transition to hybrid working we provided all employees with the materials and processes to allow them to work at home indefinitely. In the event of a similar incident all staff are able to work from home for as long as is required. This allows them to prioritise their health and safety and avoid risk of transmission.
Working from home is undoubtedly challenging and may have a negative impact on the wellbeing of our employees. We provided guidance for staff working from home to stay connected e.g., quizzes, coffee mornings and time allocated for informal catch ups.
We have also made changes to our approach to visiting customers on-site. Where appropriate, training and consultancy can be provided virtually.
With the increase in remote work and changes in the software landscape we have invested significantly in digital transformation and cyber security to ensure the safety of the business, employees and customers. This includes protection of personal data.Tackling economic inequality
OneAdvanced is committed to tackling economic inequality. We are renowned for our recruitment processes which seek to eradicate biases that can perpetuate economic inequality. We hire for potential rather than based on experience.
Our commitment to tackling economic inequality is also exemplified in our pay reporting transparency. In addition to the legal requirements to produce a Gender Pay Gap Report, we have also released our Diversity Pay Gap Report to ensure accountability and so that we can take steps to address economic inequality within our own employee base.
As we develop as an organisation and embrace our role in bettering society we are building features into our products to assist us in tackling economic inequality. One example of this is our education software that is used by prisons in the UK to help educate individuals that have been in the prison system and broaden their opportunities for education. Another example is the service we provide to many NHS offices across the country which allow them to act more efficiently and see more patients each day.
A focus of OneAdvanced is to commit to increasing our community outreach. As part of our strategy we are planning to implement a regular schedule of community education workshops for local schools, colleges and other groups. Examples include ‘How to get started in Tech’ and coding classes. Each employee is entitled to 1 paid day they can use to volunteer for a cause close to their heart including those that are aimed at helping those from lower socio-economic areas.
Our learning and development team are in place to allow our staff the opportunity to develop their skillset and further their professional career. This can allow disadvantaged individuals to increase their opportunities to secure high paying jobs both within the software industry and outside of it.Equal opportunity
Cultivating a diverse workforce and inclusive culture is a priority for OneAdvanced. Diversity of experience, age, race, ethnicity, culture, gender and sexual orientation provides a wide range of talent from entry level through to our leadership teams creating richer perspectives and a powerful frame of reference.
Not only is it right to recognise and celebrate differences, and ensure everyone has the opportunity to thrive, but creating a culture that is genuinely committed to a meritocratic workplace is important to our success. Ensuring all our employees understand and engage with our values, and have the opportunity to realise their full potential, is fundamental to our business.
We have published 4 Diversity Pay Gap reports that extend beyond the legal requirement for gender to ethnicity, sexuality, education, disability and socio-economic status. This data provides transparency and will aid us significantly on our journey to creating a fair and equitable workplace for all.
OneAdvanced is delighted to have been announced as one of the top 100 Diversity Leaders of 2020 across UK businesses following an independent survey carried out on behalf of the Financial Times. The award assesses diversity across gender, age, ethnicity, disability and sexual orientation, and ranks organisations in Europe on the extent to which they offer diverse and inclusive workplaces. The survey focused on two broad areas, looking at the scale in which employers promoted diversity within the workforce, and identifying companies that stood out when it came to encouraging diversity and equal opportunities.
OneAdvanced is renowned for its innovative recruitment process, which seeks to eradicate bias – unconscious or otherwise – when hiring. In our recruitment, we use tools that give us additional insight into intellect and attitude, and remove CVs from the interview process, so managers go in without preconceptions.Wellbeing
We take wellbeing very seriously at OneAdvanced, employees have access to the following initiatives to promote wellbeing:
Our Employee Assistance Program (EAP) is a 24/7 phone line where our employees can speak to a trained professional regarding any matters. Whether that is related to their current workload, or whether it is related to their finances for example. This service is 100% confidential.
The Wellbeing hub on our internal website is central point for resources, such as the Thrive app to which our employees have an access code. In addition, the Hub is a link to our partnership with Perks at Work who offer discounts and classes for wellbeing, fitness, and meditation.
Our offices have been made more friendly and accessible than ever before as part of our office changes brought on by the new, flexible ways of working. All our offices now contain a ‘wellbeing room’, sharp boxes for needles and free sanitary products in all bathrooms (available to guests as well as our staff).
We are undertaking an exercise to update our employee value proposition and undertook research to identify what factors employees themselves want. This was done so we can provide benefits that our employees will value from the most and benefit their health and wellbeing.
Pricing
- Price
- £46.80 to £528.00 a user a year
- Discount for educational organisations
- No
- Free trial available
- No