Skip to main content

Help us improve the Digital Marketplace - send your feedback

SIDQAM LTD

Direcht Restore

Direcht Restore is a digital implementation of the RESTORE2TM paper-tool. It is a physical deterioration and escalation application for care and nursing homes based on nationally recognised methodologies including early symptoms recognition(Soft Signs), the national early warning score based on core vital signs(NEWS2) and structured communication(SBARD) with other care organisations.

Features

  • Reduced 999 calls/conveyances
  • Interoperability standards used
  • Increased safety of residents with reduced unrecognised deterioration
  • Improved confidence of care home staff to escalate concerns
  • Recognising and Responding to Deteriorating in Care and Nursing Homes
  • App and web based
  • Secure two factor authentication
  • More effective communication between healthcare professionals and safer hand-offs.
  • RESTORE2 Full Version
  • RESTORE2 Full Version (Standard Level)

Benefits

  • Manage patients in care/nursing home settings
  • Makes communication more effective between healthcare professionals and safer hand-offs.
  • Improved confidence of care home staff to escalate concerns
  • Supports best practice
  • Interoperability standards in place
  • Link to any system using standards
  • Right care, right place, right time
  • Reduced 999 calls/conveyances
  • Increased safety of residents with reduced unrecognised deterioration
  • Reporting included

Pricing

£2.50 to £3.50 a unit a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at direcht@sidqam.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 0 5 5 6 3 6 1 9 1 1 3 9 4 6

Contact

SIDQAM LTD Business Development Unit
Telephone: 0161 818 4614
Email: direcht@sidqam.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
-Internet connection is required to use the software
System requirements
  • Modern browser on a Laptop or Desktop
  • Minimum specification for PC/Web environments

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Email to support@sidqam.co.uk
Support is provided in line with our support levels below.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
P 1 - Service unavailable for all users - Resolution time 6 working hours

P 2 - Individual Direcht service unavailable - Resolution time 8 working hours

P 3 - Core/Clinical module failure - Resolution time 24 working hours

P 4 – Non-core module failure - Resolution time 50 working hours

P 5 – New requirements or screen changes or UX issues- Resolution time potential future release if agreed by supplier-customer support group
Support available to third parties
No

Onboarding and offboarding

Getting started
Training is provided as part of the implementation project. The trust should nominate clinical champions / expert users to deal with routine queries after implementation. Documentation is also provided and there is help within the system.
The apps are intuitive, based on current recording methods, so will be familiar to staff.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
The data stored from our systems is usually pushed back into existing EPR. If no system exists, a copy of new data collected will be stored on the server housed at the trust; the trust always has access and control of its data. If the trust chooses not to use the app, the data would remain accessible on the trust server.
End-of-contract process
All data will be extracted from the system and provided to Trusts in JSON/XML format.

Once the trusts confirms safe receipt of data on their systems Sidqam Ltd will destroy all the data present on our servers and provide a written confirmation of the same.

Data extraction in another format other than JSON/XML will incur a cost / tbf.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The Mobile version is a limited functionality version. The web and Tablet versions are full functional versions.
Service interface
No
User support accessibility
WCAG 2.1 A
API
No
Customisation available
Yes
Description of customisation
We work with care/nursing homes during implementation to customise their local services, eslacation levels, email alert receivers etc.

Scaling

Independence of resources
Direcht Systems provide both vertical and horizontal scaling.

The system has been designed to manage large volumes of patient transactions in an efficient manner.

The use of ISO13606 as the underlying architecture provide the flexibility to scale and adopt.

Analytics

Service usage metrics
Yes
Metrics types
We provide a series of metrics based on data available. However trusts can define metrics they wish to view, the reporting tools are included in the software.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach
Data is stored in a way that demographic data and clinical data are stored in different set of tables. They are only linked at run-time with the two factor authentication.
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The Direcht systems provide an out of box reporting tools accessible via its web version which can be exported to Microsoft Excel for further analysis. We work with trusts to help define data the requirement and the standards used for export. This is our data extraction services for customers wishing to analyse more complex criteria. We also provide a data analytics service with can be purchased separately.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • XML
  • HL7
Data import formats
Other
Other data import formats
  • JSON
  • XML
  • HL7

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Application availability 98% with a threshold of 96%. Infrastructure downtime or other incidents within Force Majeur, planned or unplanned, is excluded from this calculation.
Approach to resilience
Available on request. Resilience provided by underlying hosting platform.
Outage reporting
E-mail alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
• Username and two-factor authentication
• Role Base Access Controls (RBAC)
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Sidqam Ltd is committed to ensuring security governance is given the highest level of importance. We have consultants who have worked in the security and information governance domain and are helping us to achieve the ISO/IEC 27001 certification.
Information security policies and processes
Our Information Security management System is used as a tool to assist us to identify and comply with business and legal/regulatory requirement and contractual security obligations. All Procedures are reviewed once a year to make sure they comply. All staff are required to comply with our information security guidelines.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our configuration and change management processes services are aligned to ITIL. All build and configuration assets are version controlled using source control. All changes are peer reviewed by at least two others and UAT performed before being merged into the base codebase.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We do in-house penetration testing. Any known vulnerabilities should be patched within 24 hours. In addition we have robust vulnerability management processes in place within Microsoft Azure to identify, triage, and mitigate vulnerabilities.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Realtime monitoring is in place to monitor potential compromises.
Microsoft Azure communicates any data breach if it becomes aware of such.
Escalation processes are in place once any compromise is identified.
The degree of compromise will determine resource allocation and urgency of response. In most cases any compromise will be addressed immediately.
Incident management type
Supplier-defined controls
Incident management approach
Customers can phone or email with incidents. We use an incident management tool (Zoho) that has built-in reporting. In addition we also have procedures for
- Conducting risk assessments for discovered security incidents.
- Notify clients in the event a security incident occurs.
- Revising our annual Security Risk Analysis and Risk Management Plan as necessary.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

We strongly encourage our staff to prioritize consideration when traveling for work. Additionally, whenever feasible, we opt for remote client meetings. Our company policy emphasizes an 'online first' approach.

Pricing

Price
£2.50 to £3.50 a unit a month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at direcht@sidqam.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.