Consentz
Consentz is a single integrated system for managing a Private Medical practice, bringing together all the tools you need to build patient relationships, grow your business, and save you time. The first medical practice management software system developed with the clinician-patient relationship at the heart of everything it does.
Features
- Practitioner Consultation Tool
- Treatment Plans
- Photo Capture and Manipulation to record Treatments visually
- Pre-Populated Consultation Notes
- Clinic Dashboard and Reporting
- Repository of Knowledge, both business and technology
- Patient Application for patient record sharing
- Bespoke Questionnaires and direct Patient education
- Stock and Invoice Management
- Multi View Calendar with Waiting Lists, Prospect Capture and Reminders
Benefits
- Increased interaction with patients and ability to address their concerns
- Enhanced customer understanding regarding their entire treatment process
- Fast and simple detailed visual record keeping of procedures
- Save time from repeated typing and improve legal standing
- Visualise your clinic's performance
- Understand your business, how and what to do it
- Keep your patients informed and engaged
- Educate you patients and understand their needs more effectively
- Complete, intuitive online system
- Manage appointments, increase retention and turn enquires into patients
Pricing
£25.00 a licence a month
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 4 7 7 2 3 0 2 9 8 2 9 8 5 2
Contact
Consentz
Michael Geary
Telephone: 01932 481 081
Email: contact@consentz.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- IPad required for the Practitioner Application, otherwise no constraints
- System requirements
-
- Twilio Account required for SMS reminders
- Stripe Account for Online payments
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within an hour if during business hours, outside business hours the question will be responded to once business hours have commenced.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Our support team is available via phone, email, or whatsapp - all included in the price of a license.
Business support is also included with Consentz, whereby we assist with advice on growing your business. This information is accessible via our Academy.
Onsite training is available at an extra cost. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
An onboarding service will be offered, and be free of charge for a limited period of time.
All new customers are taken through a series of Onboarding screens, and have the facility to import their existing data. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users can export all of their data from within the Consentz control centre - although access is limited to certain roles.
- End-of-contract process
- At the end of a contract, customers can export their data themselves using the Control Centre. Additional costs are involved for hard copies of the data (printed documents etc).
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Patient Application is designed specifically for iOS
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- For internal use only
- API documentation
- No
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Our infrastructure is run on Amazon AWS service using thier EC2, Elastic Block Storage, and RDS platforms, all being easily and almost instantly scalable.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We have a dashboard and a reports page, with selectable reports. These are set reports that can be tailored by date and various metrics (treatment type, practitioner etc) selectable by the user. They display real time results which can be exported to a number of different formats (csv, png etc)
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
Much of a users data can be exported to csv files (Patient Lists, reports, invoices) from within the Control Centre at any time they wish.
Completed Forms and Questionnaires can be downloaded on an individual bases (PDF) and reports can be downloaded in a number of different formats from the report pages.
All data can be exported and will be bundled into a zip file containing all data in various formats. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- Jpg
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Jpg
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Consentz software should have a 99.9% uptime in line with the Amazon Web Services that support it.
Any cases of reduced available will be reviewed on a case to case basis - Approach to resilience
- This information is available on request
- Outage reporting
- Service outages will be reported via email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Management interfaces access is governed by roles and a hierarchical invitation method
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- CIS
- ISO/IEC 27001 accreditation date
- 09/06/2017
- What the ISO/IEC 27001 doesn’t cover
- Our ISO 27001 certification covers Consentz as a company
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- No
- Security governance approach
- Security is a key selling point of Consentz and therefore at the forefront of our decision making when implementing features and design.
- Information security policies and processes
- Our team have no access to private customer information.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Changes to processes by third parties are monitored via mailing lists and any changes are assessed between staff and development team for impact to customer data.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We work closely with our development team to assess potential threats, as well as consulting with external companies.
Patches can be deployed very quickly, and the team is informed via developer notification from the platforms we use. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We currently have no protective monitoring process, other than Server alerts for unusual activity, and server logging.
We are in the process of enhancing this process. - Incident management type
- Undisclosed
- Incident management approach
-
We have processes in place for common events such as resetting passwords or temporarily blocking access to accounts.
Users can report incidents via email, or directly via phone.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
We have enacted a work-from home policy to redce emissions from employees through reduced travel.
We operate a paperless office.
Pricing
- Price
- £25.00 a licence a month
- Discount for educational organisations
- No
- Free trial available
- No