Sexual Health Tariff Grouper - Local Tariff Configuration
The integrated Sexual Health Tariff Grouper Local Tariff Configuration Service enables public health commissioners of sexual health services to specify locally agreed tariffs for their hosted healthcare providers. The tariffs are based on activity data supplied by healthcare providers.
Features
- Reliable implementation of complex tariff rubrics using activity triggers
- Application of provider MFFs or Geo-Weightings based on clinic location
- Use of supplementary local codes to trigger currencies
- Use of zero value currencies to monitor non chargeable activity
- Always charge host option only charges the host commissioner
- Publically available ruleset
- In year adjustments and configuration changes are included
- Centrally managed change management process keeps you in control
- Issue resolution support is included
Benefits
- Rapid implementation of a local tariff configuration
- Step-by-step support to help iron out any issues
- Tariff configuration available for out of area commissioners to review
- Local charges are universally applied to out of area activity
Pricing
£1,950 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 6 7 7 5 4 9 2 4 7 1 7 6 6 2
Contact
Pathway Analytics
Charles Hewitt
Telephone: 02033971004
Email: charles.hewitt@pathwayanalytics.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Accessed by modern web browsers over a standard secure (TLS v1.2) https connection. Subscriber accounts are associated with a valid individual email address.
- System requirements
-
- Secure https web connection using TLS v1.2
- Modern web browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 48hrs during the working week, usually within 12 hrs.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
- We provide first line support via email, within 48hrs during the working week, we usually respond within 12 hrs. If necessary, we will initiate a telephone call back or online support session.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide a detailed consultation session and supplementary sessions where necessary to help define and implement your tariff, if this will require further bespoke work beyond the bounds of the service we will provide a quote. Once the service has been defined we will release within a few hours for participating providers to apply to their data submissions.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Data can be extracted by MS Excel data files at any point.
- End-of-contract process
- Tariff configurations will remain available while the data they have been applied to remains available in the service.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Reduced functionality. Limited ability to upload data files.
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- No
- Customisation available
- Yes
- Description of customisation
- The local tariff configuration is designed to be customised within the definition of a tariff configuration. We can discuss any further customisation outside the bounds of this contract where required.
Scaling
- Independence of resources
- The service is hosted on a highly scalable platform. All heavy comput action are performed as asynchronous actions in individual serverless containers called on demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide a last logged in date time group for the subscriber. Internally, we record subscriber activity and access to data.
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Tariff configurations can be exported into MS Excel using a web query.
- Data export formats
- Other
- Other data export formats
- .xlsx
- Data import formats
- Other
- Other data import formats
- No data upload requirement in this service
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- Private Cloud
Availability and resilience
- Guaranteed availability
-
Unplanned outages < 99.99% during UK office hours (9-5, m-f) in 365 days.
Subscriptions will be extended by 24x the number of hours unplanned outage experienced during the working week. - Approach to resilience
- The service is built on a serverless architecture, each element can be independently initiated as required. Data is served from a multi-regional data center with regular backups and can be reinstated back to a point in time up to 30 days.
- Outage reporting
- We report outages, issues and changes in an update log.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Other
- Other user authentication
- One time, time-limited magic link sent to authenticated official email address of the subscriber (similar to standard password reset link). Where necessary, this is associated with a OTP sent to a validated mobile number. We also provide federated access control via recognised third party apps/services.
- Access restrictions in management interfaces and support channels
- All admin access is over VPN via federated access control.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We follow the guidance in the NHS Data Security and Protection Toolkit
- Information security policies and processes
- We follow the guidance in the NHS Data Security and Protection Toolkit
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We manage changes in a version controlled repository (github). Candidate new releases complete unit and function testing prior to release to production.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We monitor patch releases as they become available and deploy updates to dependent packages as required. We use tools such as npm audit to help identify vulnerable dependent packages.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We use third party services such as sentry.io and AWS WAF.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We follow the NHS Data Security and Protection Toolkit guidance
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Our local technology footprint is powered by 100% renewable energy.
Pricing
- Price
- £1,950 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No