ARWEN
ARWEN is a pan-European Actionable Real World Evidence Network, unlocking the value of real-world data by enabling benchmarking, collaboration, and simplifying the sharing of treatment insights across different healthcare systems, to empower hospitals to identify improvement potential in patient care. Hospitals stay in full control and ownership if their data.
Features
- Fully transparent system allows complete traceability of data.
- Platform to connect hospitals and healthcare professionals for evidence-based decisions
- Quarterly reports on elected treatment improvement projects
- Scalable data models combining patient pathways, outcomes, costs, and more.
- A team of established experts in healthcare data analytics
Benefits
- Continues support in data collection, validation and standardisation of data
- Legal framework to easily participate in multiple healthcare improvement projects.
- Free support from Real World Data to evidence and insights
- Improved knowledge on patients pathways to support patient pathway optimization
- Includes clear reporting on specific therapeutic areas and medicines
- Managed service reduces time absorbed on (legal) negotiations and onboarding.
Pricing
£0 to £0 a licence
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 0 2 9 8 8 8 1 7 5 0 2 2 4 0
Contact
LOGEX HEALTHCARE ANALYTICS LTD
Jasper Hugen
Telephone: +31 (0)6 48 05 96 37
Email: jasper.hugen@logex.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No service constraints.
- System requirements
-
- Minimum recommended technical requirements provided based on discussions.
- An internet browser
- An internet connection
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- The target response is 2 hours. Monday - Friday
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- There is a service team available and an initial point of contact for each trust. Extraction support is also available. No extra costs for this support.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Onsite or online training to support the trust in the extraction of the data. In specific programs support analytics of reports is also offered.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- In case of termination of the agreement all data stored at LOGEX Group will be disposed, including back-ups. All existing reports will be shared with Trust before deletion. Upon termination of the contact, request of the client or after maximum of five years after year-closing data will be deleted. Based on a simple algorithm every month data older than 5 years will be automatically deleted. Aggregated output (non-personal data) can be kept available for reporting purposes. On request LOGEX can provide a destruction certificate.
- End-of-contract process
- Running studies will continue and reports will be delivered. Afterwards everything will be at additional costs.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Very flexible customization of analytics and visual outputs. Users can to very large extent define what indicators to be calculated, how the indicators should be calculated, what data to be used and how the results are aggregated, structured and visualized.
Customization requests are provided by clients (end users) via flexible specifications and implemented by LOGEX.
Customization is done by translation of specifications into analytic scripts (code) and deployed to the automated analytics work-flow.
Scaling
- Independence of resources
- We ensure that specifications are accurate based on clients requirements and undertake a formal capacity management programme to ensure that these are consistently met.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We can discuss the provision of any required metrics and build those which are available into your SLA.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- N/A
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- Other
- Other data import formats
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.95% availability is standard (excluding planned maintenance), SLAs are tailored to each customer and if appropriate, service credits are issued based on the SLA targets meeting availability.
- Approach to resilience
- Datacentre resilience information is available on request
- Outage reporting
- Service outages are communicated to internal stakeholders and external key contacts. Scheduled maintenance will occur outside the hours of 07:00 and 19:00 Monday to Friday excluding English Bank Holidays.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- LOGEX requires an IP-restriction for users of the platform. Users have a personal username and password, supported by MFA. A permission scheme is applied to users to segregate e.g. admin, super user and regular user permissions.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 07/01/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO27001
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Changes are discussed/reviewed in a change control board, and approved changes are recorded in ticketing system. A security representative is part of the change control board.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We periodically run vulnerability scanners and software composition analysis tools to identify pressing vulnerabilities in our software. Patches can be deployed instantly if needed, or within the standard 2-week release schedule.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Provided through our web application firewall. Incidents, depending on their nature, can be responded to within minutes.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- LOGEX will immediately inform clients both by phone and by email within 24 hours after any data leak has been identified. A policy on reporting information security incidents describes the nature of the security incidents, how to report them and highlights the importance of evidence collection for further investigation. Reporting a security incident is a topic during information security training of the employee onboarding process. An incident response protocol is followed for every potential information security incident. This protocol includes assessment of the incident, whether personal data breach is applicable &actions to inform the data controller and relevant privacy authorities.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
At LOGEX, we believe in creating opportunities for all members of our community, especially those from disadvantaged backgrounds. We are committed to providing local employment opportunities and supporting individuals who face barriers to entering the workforce.Equal opportunity
Equal opportunity
At LOGEX, we understand the importance of fostering a diverse and inclusive workplace that reflects the communities we serve. We have implemented several initiatives to increase diversity. One example of our commitment to diversity is our targeted recruitment efforts. We actively seek out talent from diverse backgrounds by partnering with organisations that are frontrunners in diverse recruitment and using diverse recruitment networks. Additionally, we have created and implemented an in-house unconscious bias training for all our hiring managers to ensure that candidates are evaluated based on their skills and qualifications, rather than unconscious biases. Our own recruiters are passionate about diversity and due to their passion are key in guiding our hiring managers in the right direction. One of their goals is to challenge hiring managers to recruit boldly, and to make decisions based on potential and character, rather than on boxes ticked. In the past 2 years, we've achieved a significant milestone: we're proud to announce that we've hired as many women as men. Additionally, almost 40% of our employees are women. Both of these numbers are particularly noteworthy in the tech industry, where gender balance remains a challenge.Wellbeing
At LOGEX, our mission is to turn data into better healthcare. Hence, it's needless to say we recognise that the health and wellbeing of our employees are paramount to our success. We have implemented comprehensive programmes and initiatives to support the physical, mental, and emotional well-being of our workforce; One example of our commitment to employee health is our wellness programme, which offers a range of resources and activities designed to promote healthy lifestyles. This includes access to fitness classes and mental health support services. For example, we work together with mental health and wellbeing support service OpenUp which provides unlimited consultations with online psychologists and masterclasses. We offer comprehensive healthcare benefits, including access to medical professionals: 24/7 virtual GP, Expert case management, Mental health support, Health check, Nutrition consultation, Online Fitness programme via our Life Insurance Partner. and preventive absence consultations. We provide flexible working arrangements and promote work-life balance to reduce stress and prevent burnout. For example, we encourage our employees to work in a hybrid way, as we believe this will contribute significantly to our great place to work ambition. To help our employees in creating the best home office, we provide the necessary company equipment. In case of inappropriate behaviour, confidential counselors have been appointed. Our confidential counselling team is professionally trained to support employees facing these kinds of issues. Also, we provide training on health and safety protocols. For example, we’ve a group of Emergency Response Officers who maintain the local regulations and ensure the health and safety of our workforce.
Pricing
- Price
- £0 to £0 a licence
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Trusts participate without any costs in ARWEN. Specific research requests without sponsorship or direct choice can be payed for by the trust(s) itself.