Teleologic Ltd
Cardiac Inter Hospital Transfer
To electronically refer, receive and manage inpatient transfers between hospitals for cardiac surgery, TAVI, angio/PCI and other cardiology.
Features
- Real-time whiteboard for cardiac inter hospital transfer
- Patient demographics and clinical information recording
- Patient pathway event recording (request/review/procedure/discharge)
- Automatic calculation of request to transfer status against target
- Transfer history search
- Transfer reports database
- Established system used by over 50 referring hospitals
- Robust software design in use since 2008
Benefits
- Manage inter hospital transfers online
- Maintain time-stamped journal of activity
- Minimise request to transfer time
- Report pathway key performance indicators
- Use ready-made forms and processes for inter hospital transfer
Pricing
£4,500.00 a unit a year
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at info@teleologic.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
2 0 3 9 1 3 0 8 8 2 3 7 6 8 5
Contact
Teleologic Ltd
Information Team
Telephone: 01603 765737
Email: info@teleologic.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- The service is available only on the Health and Social Care Network (HSCN)
- System requirements
-
- Web browser required
- Health and Social Care Network (HSCN) connection
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 45 minute response time during standard UK office hours for critical issues. 4 hour response time during standard UK office hours for other issues.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Support levels are as follows:
Critical Faults: Teleologic will correct the fault or supply circumvention instructions within 8 working hours. If circumvention instructions are required, then Teleologic will correct the fault within a further 3 working days.
Material Faults: Teleologic will correct the fault or supply circumvention instructions within 3 working days. If circumvention instructions are required, then Teleologic will correct the fault within a further 12 working days.
Correction Faults: Teleologic will discuss the issue with the customer within 3 working days and either correct any fault within a further 12 working days or agree that the issue should be treated as an enhancement to the software.
The above levels of support are included in the cost of the service.
Each organisation using the service will be allocated a technical account manager. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Teleologic provide user documentation that has been designed for ease of use and speed of getting started.
Teleologic provide remote training by webinar to super-users. Super-users provide cascade training to users on site. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- CSV file
- End-of-contract process
- Extract data to CSV file is included in the contract price
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- System web servers and database resources are allocated to a specific number of user sites. The system design has a maximum number of transactions per user site known at design time. In this way Teleologic can ensure that the system load does not exceed that which was planned for at design time.
Analytics
- Service usage metrics
- Yes
- Metrics types
- The system reports the number of inter hospital transfers made by referring hospitals to each receiving hospital by calendar month
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Online data extract tool is available to authorised super-users. The data is exported to CSV file.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Teleologic Ltd will ensure 99.5% system uptime excluding planned maintenance. In the event that this target is not met over the period of 12 months, customers will be credited with a 5% reduction for the following year's annual fee.
- Approach to resilience
-
The data centre uses the principles list below to achieve resilience:
High availability using database replication and application server mirroring.
Protection against single point of failure by distributing system components across multiple infrastructures.
Guaranteeing integrity through transaction and server backups. - Outage reporting
- The Cardiac Inter Hospital Transfer home page provides system status information and displays notifications of forthcoming planned maintenance.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Limited access network (for example PSN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access is restricted to VPN connections identified by firewall rules. Individual management/support logons have username/password and use 2-factor authentication.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- NHS Data Security and Protection Toolkit (Organisation code 8HL98)
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- NHS Data Security and Protection Toolkit (Organisation code 8HL98)
- Information security policies and processes
-
Staff Awareness of Information Governance: all staff members are provided with appropriate training on information governance.
Confidentiality and Data Protection Assurance: access is monitored for effective confidential and personal information protection.
Information Security Assurance: operating and application systems support appropriate access control functionality and documented and managed access rights are in place for all users.
Contractual Information Governance Responsibilities: all contracts (staff, contractor and third party) contain clauses that clearly identify information governance responsibilities.
Security Events Management: documented incident management and reporting procedure is in place.
Secure Communication Networks: continuous monitoring against unauthorised access to networks, servers and data.
Incident Reporting: Incidents are reported to named individuals and to appropriate authorities where required, initiated and completed by the Information Governance Lead.
Business Continuity: documented plans and procedures to support business continuity in the event of power failure, system failure and other disruptions.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Teleologic maintain an in-house software component repository and source code archival system to enable audit and tracking of system components.
Application changes are assessed and documented using the following standards: Data Protection Impact Assessment, Clinical Safety Assessment. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- The cloud hosting platform is configured for automatic update according to an update policy of update by default. Potential threat monitoring is according to security advisories alerts.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Data centre standard tier facilities generate alerts and actions lists for potential compromises. Alerts will be assessed by trained Teleologic personnel as critical, material or corrective. Response times will be in accordance with assessment, including 24/7 response for critical incidents.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Information security incidents will be reported to the named lead who will ascertain the level of risk and ensure any immediate action is taken appropriate to the level of risk. A log will be kept of all incidents reported.
Each incident will be scored for Severity of Incident
Level 0: A near miss / non-event.
Level 1: Confirmed as an IG Serious Incident Requiring Investigation.
Level 2+: Confirmed as requiring report to the ICO, DoH and other central bodies within the specified timescale.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- NHS Network (N3)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Teleologic Ltd support delivering additional environmental benefits in the performance of the contract by working towards net zero greenhouse gas emissions. Specifically Teleologic monitor suppliers for environmental performance and minimise company business travel.
Pricing
- Price
- £4,500.00 a unit a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Full functional service for limited time period of 3 months
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at info@teleologic.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.