Synbiotix Solutions Ltd- X Suite Solutions
Synbiotix offers a soft service solution to ensure the effective rostering of staff in both clinical and non-clinical environments. Check-in and Check-out functions ensure that tasks are completed and logged including their time and location.
Features
- Stock Management
- Audit & Compliance
- Task Manager
- Electronic Meal Ordering
- Nutritional Analysis
- Open API integrations
- Helpdesk
- Real Time Location Tracking
- Data visualisation
- Dashboards
Benefits
- Improved staff efficiency
- Provision of accurate service metrics
- Reduce cost
- Reduce Food Waste
- Improved reporting data
- Help manage patient flow
- Improve compliance
- Improved patient experience
- Improve job completion rates
- Improved performance visibility
Pricing
£1,000 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 2 5 2 1 2 1 2 9 9 7 0 1 5 4
Contact
SYNBIOTIX SOLUTIONS LIMITED
Jay Siad
Telephone: 03304004150
Email: sales@synbiotix.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- The X suite service is stand-alone operated through a customisable builder to create independent functions, eliminating the need for external assistance or technical expertise. We assist in integrating the suite into the customer’s broader software system and can be linked to other integrated systems, such as the SFG20 maintenance library, external provider systems, and national databases. Our approach assumes that customers take responsibility for delivering end-user training and data extraction, transformation, and loading, while we facilitate and provide support to the customer in these areas, enabling secure and effective data migration.
- System requirements
- Sites must access our URL on HTTPS Port 443.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our commitment to customer satisfaction extends to our email support service. We strive to respond to all customer inquiries within 24 hours of receipt, ensuring timely assistance and resolution to any issues or questions they may have. Our dedicated support team is trained to handle a wide range of queries efficiently and effectively, providing comprehensive responses tailored to the customer's needs. In cases where further investigation or escalation is required, we maintain open communication with the customer to keep them informed of the progress until a resolution is reached.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
-
Our web chat service will not only be accessible but also user-friendly and efficient, catering exclusively to paying customers as an integral part of our support desk infrastructure. It will serve as a convenient avenue for customers to seek assistance, ask questions, and resolve issues promptly. Access to the web chat feature will be seamlessly integrated into our help portal, ensuring that paying customers can easily locate and utilise it whenever they require support.
Our platform is designed with accessibility features in mind, making it navigable and usable for individuals with disabilities or special requirements. This includes providing options for screen reader compatibility, keyboard navigation, and clear visual cues to aid users in accessing and using the chat interface effectively. Service representatives receive comprehensive training to handle inquiries and provide support through the web chat channel. They will be equipped to assist customers with diverse needs, including those related to accessibility, ensuring that every interaction is handled with professionalism and care.
By prioritising accessibility, our web chat service enhances customer satisfaction and engagement. We understand the importance of providing inclusive support options, and our commitment to accessibility reflects our dedication to serving all customers equitably and effectively. - Web chat accessibility testing
-
As part of our commitment to accessibility, we recognise the importance of ensuring that our services are usable by individuals with diverse needs, including those who rely on assistive technology. During the testing phase, we integrate screen readers into our webchat application to evaluate compatibility and effectiveness for users who depend on such technology. We collaborate with individuals who use screen readers to navigate and interact with digital interfaces, gathering feedback on their experiences and any challenges they encountered.
Through this testing process, we gain valuable insights into the usability of our webchat platform for assistive technology users. We identified areas for improvement and make necessary adjustments to enhance accessibility, such as optimising keyboard navigation, improving screen reader compatibility, and ensuring clear and intuitive interface elements.
We provide an inclusive webchat experience that meets the needs of all users, regardless of their abilities or the technology they rely on. By conducting testing with assistive technology users, we ensure that our webchat platform is accessible, user-friendly, and effectively supports individuals with diverse needs. - Onsite support
- No
- Support levels
-
As a minimum, all Synbiotix’s X suite includes maintenance and functional upgrades within the software subscription itself. In addition, we provide enhanced application support services that have subtle differences in emphasis compared to traditional on-premises applications. This is due to the software and infrastructure being managed and maintained for all customers under the terms of Software as a Service (SaaS) agreement. The support services for all X suite subscriptions cover basic tracking and incident monitoring as well as delivery of automatic configuration changes. They also include enhanced services to cover integration between the applications and on-premises solutions or to non-X suite applications or services to assist customers in assessing the impact and potential benefits of new functionality coming from the X suite in the future. We provide management support for the following:
Asset Register
SFG 20 Integration
Planned Preventative Maintenance
Help Desk
Reactive Job Scheduling
Resource Management
Our support is geared towards adoption of functionality, changes in configuration, management of interfaces, and general advice and guidance, rather than break-fix. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
To assist customers in using our service, we provide comprehensive onboarding and training, which includes access to our training manager and online help portal with videos and scribes with the aim of providing effective knowledge transfer. Onboarding is the starting point to fully integrate new users with the skills and knowledge required to utilise our services and we work with the customer to create a training program to meet their specific needs, schedule, and skills accordingly.
We offer onsite, offsite, and/or online training to accommodate their needs and accommodate reasonable adjustments, such as enlarged text, special seating arrangements, and rearranged times and/or locations. In addition to onsite, offsite, and online training, we also provide user manuals to assist in their competency in using the service, which can be adjusted to accommodate braille and non-English languages. All texts are straightforward and provided in simple, non-technical jargon.
In addition to our service, the onboarding process also connects the customer’s workforce with other relevant processes and applications, such as learning, goal setting, and system management software tools. We typically provide 5 training courses that take place onsite/remotely with coordinated time slots allocated based on customer convenience. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
All data is stored in conjunction with GDPR and the Data Protection Act (2018) according to data subject rights. On contract end, all historic data is extracted and handed over to the customer as a Comma Separated-Values (CSV) file by whatever means the customer selects, such as a hard disk. We will provide a full hand back and deletion with the customer physically downloading all data and sending any physical component back on completion. Prior to extraction, we inspect the data to ensure that mappings, transformations, and data cleaning procedures are operational. After testing is completed, the extraction is executed while source systems are stopped.
Once completed, we will then destroy any physical component, such as a disk, and remove all data from our system in compliance with ISO 27001 using NIST 800-88 compliant destruction software to ensure all redundant data is removed to an irrecoverable level according to HMG Infosec Standard 5, wiping all open and proprietary data from our database. Hard copy data format will be shredded in compliance with DIN 32757 level 3, crosscut and then mixed with data remnants in a secure environment to ensure that any remaining contents are indecipherable after destruction. - End-of-contract process
-
When Synbiotix completes its contract lifetime with a customer, we first extract their historic data upon the client’s request. This is done by physically downloading their data and giving it over to the client in a CSV file format. Once we have handed the customer’s data back to them, we scrub it from our server using the outlined destruction process.
All onboarding and offboarding is designed in conjunction with the needs of the customer, according to their skills, experience, and knowledge. We provide basic onboarding and offboarding as part of our costed service provision but can adapt by providing additional and/or external services should the customer require these offerings. Common additional services for onboarding include Hardware support and integration services, while common additional services for offboarding include data migration and physical disposal of data storage devices.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- For administration tasks (which are performed online) service users will need to use the browser version of our service. All offline services related to job allocation and meal ordering are available offline on both platforms.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Our service interface is designed to be intuitive and user-friendly, providing a seamless experience for users. It features a clean and modern design with easy-to-navigate menus and intuitive controls. Users can access all the main features of our service directly from the interface, including account management, data visualisation, and reporting tools. The interface is optimised for both desktop and mobile devices, ensuring that users can access our service from anywhere, at any time.
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- We conduct thorough interface testing with service users to ensure that our interfacemeets their needs and expectations. This includes usability testing with real users to gather feedback on navigation, layout, and functionality. Additionally, we conduct accessibility testing to ensure that our interface is usable for all users, including those with disabilities. User feedback is integrated into the design process to continuously improve the interface and enhance the user experience.
- API
- Yes
- What users can and can't do using the API
- Our API allows users to perform a wide range of actions, including retrieving data, submitting requests, and managing accounts. Users can retrieve data from our service, such as user information, transaction history, and analytics reports. They can also submit requests to update or modify data, such as creating new accounts or updating existing records. However, certain actions, such as administrative tasks and system configuration, are restricted to authorised users only.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Each of our X suite services are stand-alone, operated through customisable builders developed to create independent functions, eliminating the need for external assistance or technical expertise. We assist customers in integrating our suite into their broader software ecosystem. This includes linking the suite to external systems and databases, external provider information systems, and national databases like the national database for nutrition and allergen data. Our team provides guidance and support throughout the integration process, ensuring seamless connectivity between our suite and other systems.
Our service assumes that customers take responsibility for delivering end-user training and data extraction, transformation, and loading, while we facilitate and provide support to the customer in these areas, while enabling data migration. While customers are responsible for migrating their data to our service, we provide tools and support to enable smooth data migration. Our team works closely with customers to ensure data is transferred securely and accurately.
While our X suite services are highly customisable, there are some constraints to consider. These include maintenance windows for system updates and the level of customisation allowed within each service. However, within these constraints, clients have the flexibility to configure the services according to their requirements.
Scaling
- Independence of resources
- To ensure guarantee that users are not affected by the demands of other users when using our services, we constantly monitor usage via Odessey Solutions. We use the resultant data analytics to provide a demand forecast of our cloud-based services, ensuring that we have sufficient redundancy and capacity to allow for data peaks and spikes as well as natural increases in volume and unforeseen demand. Our contractual SLA on uptime can be found in our contracts and we have established rigorous continuity plans based on risk assessments both of which feature in our business continuity plan.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide a comprehensive set of service metrics to help customers monitor and evaluate the performance of our service. These metrics include key performance indicators (KPIs), such as uptime, response time, and user activity. Customers can access these metrics through our reporting dashboard, which provides real-time data and customisable reports. Our goal is to provide customers with actionable insights to optimise their use of our service and achieve their business objectives.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- Data at rest in mobile devices and database server is stored encrypted using AES 256 bit.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- All data is imported and exported via CSV file, which typically goes through a phased sequence, in which we divide data into groups and test one specific group at a time to ensure optimum integration and security. We ensure that the process is smooth, carefully considered, and executed according to best practice. Even after extraction, we ensure that the system integrates imported and exported data efficiently by running user acceptance scripts with the clients and data validation exercises.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- We also support HSCN.
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
We are accountable for all system availability in accordance with the principles of GDPR and the Data Protection Act (2018), as well as confidentiality and integrity of all data processed within our service delivery framework. We guarantee the reliable availability and resilience of our services by conducting backups of our physical servers at regular intervals using encrypted cloud storage solutions and provide regular service uptime reports and downtime. In addition, we ensure that the following is maintained through service delivery:
Transparency regarding data usage.
Data is accurate, current, and removed when no longer necessary.
Processing is lawful, fair, transparent, and essential for a specific purpose.
Data is stored safely and securely.
Data breaches are immediately reported to the ICO.
In accordance with our SLA’s, we will refund all customers if our services do not meet our guaranteed levels of availability. - Approach to resilience
-
We have a resilience strategy in place to ensure that our service remains consistent even when faced with unforeseen disruptions or cyber-attacks. Our datacentre incorporates encryption methodologies, robust security system protections, and sophisticated intrusion detection systems designed to ensure resilient data across all stages of its lifecycle. We utilise the cloud system to ensure that all data is responsibly backed up. Our deployment is facilitated via TLS 1.2 with website certificates securely signed using 2048-bit RSA with SHA-256. using HTTPS using only TLS 1.2 with website certificates securely signed using 2048-bit RSA with SHA-256. Data at rest in mobile devices and database server is stored encrypted using AES 256-bit.
In addition, we have implemented a dynamic Business Continuity Plan that incorporates a detailed disaster recovery system and redundant system deployment should any issues occur. Our planning ensures that the system remains uninterrupted ensuring consistent availability of our services even in the face of unforeseen disruptions. The resilience strategy is reviewed every 6 Months by Data Protection Officer, Damn Solutions, to guarantee that our systems remain robust and flexible and is consistently enhanced wherever possible. - Outage reporting
-
We responsively report outages to ensure that all parties are always informed and up to date with all aspects of service provision. Outages are reported to customers through a public dashboard, emails, and SMS alerts as soon as information is available. We utilise CPU system monitoring to identify any outages and we also receive identification of outages via reactive updates when informed by customers.
Service outages are reported to customers according to the following best practice:
-Acknowledging issues immediately with customers through an initial alert.
-Empathising with impacted customers by showing genuine understanding, especially for those most heavily affected.
-Communicating the scope of the outage with customers, such as the regional impact and expected time of outage.
-Focusing on customer impact rather than internal cause.
-Providing mitigating alternatives to assist customers in the interim period, such as backup options.
-Providing context and any mitigating actions being undertaken.
-Providing customers with regular updates via the dashboard and following up on specific customer concerns via preferred communication channels such as email and SMS alerts.
Odyssey Solutions will monitor outages and queries, ensuring that updates are provided to customers.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We utilise username and password as standard and active directory integration to ensure only key figures can access systems and MFA in some areas. We adhere to best practice for user passwords, with a two-factor authentication, minimum password length, a requirement for mixed case, and non-alphabetic characters. Passwords cannot be reused, in whole or in part, and must be changed according to local IT or regional policy. Users are instructed not to share passwords or duplicate them between platforms. Some sites have a generic login and everyone is provided with a personalised login, and utilise PEN testing as standard.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Cyprus Certification Company
- ISO/IEC 27001 accreditation date
- 13/07/3023
- What the ISO/IEC 27001 doesn’t cover
- The service covers all elements of our service.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We are an ISO 27001 registered company and operate in accordance with GDPR policy, the Data Protection Act (2018) and Cyber Essentials Plus as standard. As part of the on-boarding process, all new employees are informed of their role in security, which is outlined in their guidebook. In addition, staff are provided with mandatory security awareness training, which is recorded on a training matrix and is refreshed annually or whenever there is an update or incident. In accordance with our security policies and processes, a detailed list of all employees operating the customer systems cannot be provided.
All employees and external users are informed about changes to security policies and processes via email campaigns and articles.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All processes and policies are defined following industry best standards and are integrated into our change management processes as standard. Most of the policies are internal being audited in conjunction with ISO 27001, which is undergone annually with a report being made available to our customers on completion.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We employ a proactive vulnerability management approach to assess and mitigate potential threats to our services. This includes regular vulnerability scanning and penetration testing to identify and address security vulnerabilities. We use industry-standard tools and techniques to assess the security of our systems and applications, and we prioritise the deployment of patches and updates to address any identified vulnerabilities.
Additionally, we monitor security advisories and alerts from reputable sources to stay informed about potential threats and vulnerabilities. Our dedicated security team is responsible for monitoring and managing security incidents, ensuring that our services remain secure and resilient against evolving threats. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- All processes and policies are defined following industry best standards and are integrated into our change management processes as standard. Most of the policies are internal being audited in conjunction with ISO 27001, which is undergone annually with a report being made available to our customers on completion.
- Incident management type
- Supplier-defined controls
- Incident management approach
- All processes and policies are defined following industry best standards and are integrated into our change management processes as standard. Most of the policies are internal being audited in conjunction with ISO 27001, which is undergone annually with a report being made available to our customers on completion.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We will commit to fighting climate change in line with the UK government’s goal of achieving Carbon Net Zero and have already committed to achieving Net Zero emission by 2030. We commit to establishing an overall carbon reduction of 25%, which we will achieve by implementing initiatives such as the following:
Vet all suppliers in our supply chain to ensure that they are committed to carbon reductions in compliance with ISO 14001 and PPN 06/20.
Work in collaboration with our customers and suppliers to reduce our overall carbon emissions.
Continue to outsource our waste management with a third party and will develop KPIs with them for the duration of the contract.
Take steps to improve our company fleet by reviewing the possibility and actuality of using electric vehicles throughout our company and encouraging care sharing where possible.
Provide staff with the opportunity to work from home where possible to help with fuel costs of driving into work.
Implement a Carbon Reduction Plan outlining our commitments in detail and in accordance with PPN 06/20, as well as associated guidance and reporting standards for Carbon Reduction Plans. Our plan will be reviewed and signed by our Managing Director, Mark Edell, on an annual basis.
All details regarding emissions will be reported and recorded in accordance with the published reporting standard for Carbon Reduction Plans and the Green House Gas Reporting Protocol standard, using appropriate Government emission conversion factors. To ensure we achieve the initiatives proposed, Mark Edell will hold quarterly SV meetings, outlining current progress. The meetings will be used to identify areas of improvement and implement relevant changes, which will then be communicated to the authority.Covid-19 recovery
Following the Covid-19 pandemic, we will commit to assisting in society’s recovery by providing initiatives based on some of the known negative consequences. Since social distancing measures came into play, society has depended more strongly on socialising online, resulting in more time and activity spent virtually. In addition, the adoption of additional hygiene habits has lowered the rate of infection transference. We therefore commit to the following initiatives:
Arranging virtual e-safety webinars, which we will deliver to vulnerable people in the community, such as local elderly populations. We will advise them on how best to stay safe online and commit to completing 2 sessions per year.
Providing fraud prevention webinars to vulnerable groups, school children, and local SMEs. As part of fraud prevention training, we will discuss the 3 types of fraud cited in the Fraud Act 2006 as follows:
By false representation.
By failing to disclose information.
By abuse of position.
Encouraging the local community via posters and leaflets to continue habits associated with safe hygiene, including the following:
Regularly washing hands.
Limit touching of the face.
Limit social contact where required.
Utilising hand sanitiser where possible.
Continuing these habits and learning about safe protocol will also minimise resources spent addressing the avoidable issues of fraud and infection, allowing community providers to focus on other areas. To ensure we achieve the initiatives proposed, Mark Edell will hold quarterly SV meetings, outlining current progress. The meetings will be used to identify areas of improvement and implement relevant changes, which will then be communicated to the authority.Tackling economic inequality
To improve the economic situation in our local community and decrease economic inequality, we will commit to several initiatives in conjunction with our Equality and Diversity Policy (EDP). The initiatives will seek to mitigate the cost-of-living crisis and support economically vulnerable individuals within the community. To support economic inequality in the community, we will implement the following schemes and initiatives:
The provision of work experience to vulnerable young adults, in which we will provide 40 staffing hours towards local community workshops.
Our team will utilise local businesses for 75% of our supply materials and services.
Provide support to local women by sponsoring Local Charity Emmaus to create a supportive living environment for adult women in the early stages of substance abuse recovery.
The creation of 2 new jobs for long term unemployed people.
Aligning with local job centre plus to help develop employment skills within the community.
Identify and manage all cyber security risks that are present within our line of operation and within this social value outcome.
Provide 52 hours of volunteering work.
Offer 3 apprenticeships, paid and unpaid work experience placements in the next 24 months.
Reaffirm our commitment to charitable activities.
Work with local colleges and job centres to signpost opportunities for those in the local community.
To ensure we achieve the initiatives proposed, Mark Edell, will hold quarterly SV meetings, outlining current progress. The meetings will be used to identify areas of improvement and implement relevant changes, which will then be communicatedEqual opportunity
In conjunction with our EDP, we will commit to the provision of equal opportunities for all employees by eliminating discrimination from our workplace. We will create a culture of equality and inclusivity, reflected in our recruitment process, alongside daily practices that provide a working environment in which all members of the team are treated with dignity and respect. All members of staff will be responsible for supporting the aims and spirit of our EDP and culture of inclusion.
Our policy informs recruitment and our working culture, helping us to avoid discrimination based on any protected characteristics such as age, disability, gender reassignment, sexual identity, marriage or civil partnership, pregnancy and maternity, race, nationality, and ethnic or national origin, religion, or belief. We will ensure that the following aspects of our service delivery avoid any unlawful discrimination:
Pay and benefits.
Terms and conditions of employment.
Dealing with grievances and discipline.
Dismissal
Redundancy.
Parental leave.
Flexible working.
Wellbeing initiatives such as employee assistance programmes and counselling.
Selection for employment, promotion, training, or other development opportunities.
The success of our EDP commitment will be monitored through anonymised surveys included at the end of our job application forms. This will ensure that we are continuing to advertise positions to a diverse range of candidates, including young people not in education, employment, or training. Our approach to equal opportunities will be disseminated to staff during their induction process upon joining the company, with refresher training conducted annually. All training will be monitored by Training Officer, Lucy Sonner, with progress logged on our internal training matrix.
To ensure we achieve the initiatives proposed, Mark Edell will hold quarterly SV meetings, outlining current progress. The meetings will be used to identify areas of improvement and implement relevant changes, which will then be communicated to the authority.Wellbeing
We will work with staff to integrate an awareness of health and wellbeing into our day-to-day activities, enabling us to create a positive and healthy working environment. Our current Health and Wellbeing Strategy, outlines how we will strive to improve mental health within our organisation, such as:
Wellbeing initiatives such as social events, reward programmes, and additional training opportunities.
Employee support mechanisms such as supervision, CPD, and an open-door policy.
Joint working with staff, representatives, and our local partners, to identify and address areas for improvement.
Employee Assistance Programme, which monitors the trends in staff wellbeing to identify issues of stress and burn out.
Offering staff discounts and free access to health advice from partners, such as Doctor Care Anywhere.
Counselling sessions run by a mental health professional.
Promoting alternative modes of transport through funding, such as bus passes, walking incentives, cycling, and using car shares.
A communal area where staff can socialise with others to share best practices and broaden their support network within our organisation.
Mental health awareness training.
Working with employees to ensure issues that may impact negatively on staff health are identified and addressed.
Wellbeing training for managers to ensure the development of key skills, knowledge, and an ability to support employees to improve their health and wellbeing.
Wellbeing meetings to increase staff awareness as to what is important in ensuring their own health and wellbeing.
We will continue to regularly review our strategy on a yearly basis to ensure that our initiatives remain relevant and effective. To ensure we achieve the initiatives proposed, Mark Edell will hold quarterly SV meetings, outlining current progress. The meetings will be used to identify areas of improvement and implement relevant changes, which will then be communicated to the authority.
Pricing
- Price
- £1,000 a unit
- Discount for educational organisations
- No
- Free trial available
- No