RLDatix PolicyStat
Policies are designed to create safer, sustainable care for every patient whilst protecting the welfare of your people. Bring policies to life with PolicyStat: Reduce admin waste and frustration associated with policy creation, search and management. Ensure you have the right policies in the right place, making the right impact.
Features
- Standardise policy content and styling across your organisation
- Reflect policy revisions automatically everywhere
- Share a policy across multiple locations, as applicable
- Powerful search-as-you-type technology
- Every word of every document is searchable
- Automated review & approval process
- Configurable approval flows
- Approver dashboard, email notifications & reminders
- Powerful advanced reporting suite
- Record staff acknowledgement of a policy
Benefits
- Bring your policies to life
- Take the admin waste out of policy creation and management
- Right policies in the right place, making the right impact
- Avoid costs associated with poor policy adherence
- Policies regularly updated and reviewed to the appropriate standards
- Staff access to the right policies at the right time
- Ensure policies are understood and used across all staff groups
- One source of truth across the organisation
- Access anywhere, anytime, any device
- Streamline the creation/approval process with effective & efficient workflow
Pricing
£5.75 to £60.62 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 8 4 7 4 9 0 2 0 4 7 5 7 6 7
Contact
Allocate Software Limited
UK Sales
Telephone: +44 (0)20 7355 5555
Email: bid.manager@rldatix.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- RLDatix DatixCloudIQ
- Cloud deployment model
- Public cloud
- Service constraints
- None that affects primary use of the product. Every two weeks on Sunday for a 4 hr period, the application goes into read-only mode for maintenance; all data is still retrievable.
- System requirements
- Please see Service Definition for full details.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
The PolicyStat Service Desk is available 9.30am to 5.00pm UK Time, Monday to Friday, except UK public holidays. email acknowledgement within 3 working hours from receipt of request
Critical = 1 working day
High = 2 working days
Normal = 5 working days
Low = 10 working days
Please refer to the Terms and Conditions attached to this service. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- We use Zendesk Chat to provide a service. Zendesk is not currently compliant with WCAG but does support US accessibility standard Section 508.Web chat accessibility testing
- Web chat accessibility testing
- We use Zendesk Chat to provide the service, and details of their assistive technology compliance and testing is available at https://www.zendesk.com/company/policies-procedures/section-508-accessibility/
- Onsite support
- Yes, at extra cost
- Support levels
- Please refer to the Terms and Conditions attached to this service. Typically, as an RLDatix product, RLDatix have a single support level for all customers, defined in the RLDatix Service Level Agreement. The cost of this is incorporated in the annual charge. The Service Desk is the customers primary contact for technical help in the event of the customer encounters any faults in the licenced programmes that prevent it running as intended. It is also available to customers who require quick fixes or how to help in the event of a gap in knowledge. Success Plans can be purchased to provide additional administration support.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide a full onboarding service to take your current policies and documents. The conversion team will cleanse and upload the documents to ensure that they are standardised and ready to be accepted by the customer.
Remote training is included in the implementation to allow the organisation to cascade the information to all service users. Along with intuitive videos and helpful articles via the learning centre. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Bulk pdf backup service can be utilised by customers to ensure that all information can be download as a hard copy if required. Automated Data Backup Service could be paid for by the customer if required.
- End-of-contract process
- Upon conclusion of the contract, all data is exportable from the application as PDF documents. Reports are exportable as CSV files. Should other file formats be required and/or long-term storing of data be required, additional costs would occur dependent on scope.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Because users want to do different things on their mobile devices compared to their desktop machine, we optimise support for searching, viewing, approving, collaborating and reporting on the following browsers:
Mobile Safari- The latest version supported on the 3 most recent major versions of iOS
Android browser- The latest version supported on the 3 most recent major (codenamed) versions of Android
Chrome Browser for Android- The latest stable version - Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- PolicyStat uses robust localisation to support content delivery networks increasing the likelihood that a user will have the media cached. Further, PolicyStat utilizes data partitioning and load balancing to ensure demand needs are met.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Policy Activity / customer totals are presented, showing active users, active subdomains and policy areas,
Searches, logins, approvals and editing sessions will provide a graph for each of metrics over time series
Search results to show top searches by search term and number of searches alongside top searches without producing results to support documentation. and finally the policy selected after searching
All policy views based on number of views
policy access over time via graph looking at viewing stats, print stats, editing, email and download to word stats. - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Documents can be exported to word to edit outside of the application if required
Reports exported to Excel
CSV reports can be downloaded throughout the application - Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- Other
- Other data import formats
-
- Text Based (e.g. Word, PDF, .txt, .rtf)
- Image Based (e.g. .png, .gif, .jpeg, etc.)
- Attachments can be any file type
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- We will use commercially reasonable efforts to make the PolicyStat Service available with an Annual Uptime Percentage of at least 99.95% during the Service Year.
- Approach to resilience
- We utilize industry-leading AWS as its hosting provider. Additionally, redundant backups and fail-overs are in use.
- Outage reporting
- Reports of outages are provided via email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Available is LDAPS and/or SSO via SAML 2.0 support for in-product access. Support channels are generally open to all customers.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- SOC 1 Type II
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- The Open Web Application Security Project is an international community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted, publishing a Top10 of most critical vulnerabilities found in applications, with mitigation strategies/advice. PolicyStat has specific tools/processes to mitigate/eliminate the potential for each.
- Information security policies and processes
- PolicyStat has a Director of Product Development who reports up to the CTO. Policies and change control procedures are clearly outlined/managed in our own product (nearly 40 policies) that are closely monitored and followed. These include items such as Vulnerability Alert Review and Prioritization Process to Product Enhancement Workflow to Operations plan for system outages.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- PolicyStat uses a rolling development schedule, leveraging all the benefits of git with regards to versioning and change control. When improving a component of the PolicyStat software, the primary developer creates, a secondary developer does a code review, and then testing is performed as well. Only at that point will any enhancement be pushed for client use. Additionally, rolling backups are kept such that if a change ends up having a bug and roll-back is required, that is available.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
The Common Vulnerability Scoring System (CVSS) provides an open framework for communicating the characteristics and impacts of IT vulnerabilities.
The National Vulnerability Database provides qualitative severity rankings of "Low", "Medium", and "High" for CVSS v2.0 base score ranges in addition to the severity ratings for CVSS v3.0 as they are defined in the CVSS v3.0 specification.
Critical vulnerabilities (greater than 9.0 for CVSS v3.0) should be mitigated within 10 days of release, and must be mitigated within 20 days.
High vulnerabilities (greater than 7.0 CVSS) should be mitigated within 30 days, and must be mitigated within 60 days. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
Includes: GitHub Security Alerts - Whenever there is an security alert regarding one of our third-party dependencies, GitHub automatically sends us an alert (email) and updates this page. Conveniently, the alert will be automatically resolved when a pull request is merged in that either updates or removes the offending dependency.
AWS EC2 AMI Alerts - Whenever a new Linux AMI is released, the team is notified by email of the new image. As a follow-up to a release of a new image, we manually review the Latest Security Bulletin to determine how to prioritize the AMI update. - Incident management type
- Supplier-defined controls
- Incident management approach
- PolicyStat uses Five Whys Root Cause Analysis as a tool to extract the maximum amount of learning from incidents and to then apply a proportional investment in corrective action to improve the organization as a whole. The stakeholders, usually engineering, client services and administration, meet to understand why an event happened at a deep level. Five whys is about finding the root process/system/culture problem that precipitated the adverse event. Users can report events via UserVoice. Incident Reports are provided via email.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Fighting climate change and supporting Net Zero RLDatix recognises that it has a responsibility to the environment beyond legal and regulatory requirements. We are committed to reducing our environmental impact and continually improving our environmental performance as an integral part of our business strategy and operating methods. To achieve this, RLDatix has completed the following: • RLDatix has an Environmental Policy that is reviewed on an annual basis to ensure it is relevant to the business • RLDatix has engaged our travel partners to ensure travel is as carbon efficient as possible, i.e., recommends trains rather than flights • Throughout all RLDatix offices we provide waste receptacles for recycling and general waste, supporting the reduction of waste to landfill • We encourage the reduced use of water and electricity and actively encourage the staff to consider the environment whilst printing • Many of our solutions assist our customers in reducing their own carbon footprint, i.e., assisting with route planning for community-based staff • RLDatix is working to be carbon neutral in the next few years and achieve ISO 14001 accreditation Many of these environmental proposals help us and will help you in your path to Net Zero. We are firmly committed to carbon reduction, as demonstrated by our Carbon Reduction Plan, published here: https://rldatix.com/en-uke/corporate-responsibility/
Pricing
- Price
- £5.75 to £60.62 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No