Skip to main content

Help us improve the Digital Marketplace - send your feedback

READY COMPUTING LIMITED

Lot 2 Channels360 Cloud Software

Channels360 is a care management solution. It combines clinical care coordination and access to community services to address SDoH to enable care providers to coordinate care between clinicians, partner organisations, community care offerings, and citizens through the design and implementation of care pathways that coordinate point of care and recipients.

Features

  • Real-time event processing
  • Intuitive program modeler to define programs and tasks
  • Real-time workflow management and ad hoc task generation
  • At-a-glance program and team performance review capabilities
  • Resource locator with list and map views, distance calculation
  • Digital Front Door with optional account creation and profile management
  • Automated service matching to available community resources
  • Closed-loop referrals
  • Care coordination builder
  • Community resource management

Benefits

  • Integration across the ICS at place, neighbourhood, and systems levels
  • Single, easily customisable, shared view of complex data and pathways
  • Secure in-app, SMS, and email messaging
  • Patient engagement, experience, and outcomes management
  • Automated alerts, flags, and notifications
  • Real-time clinical, referrals, and other events of interest
  • Governance of clinical, social, and other protocols
  • Coordination with existing systems and software
  • EPR companion
  • Secure, powerful data integration via SMART on FHIR

Pricing

£1,000 a licence

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@readycomputing.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 1 3 1 0 8 7 3 8 3 9 2 5 1 3

Contact

READY COMPUTING LIMITED Philip Colbourne
Telephone: 020 755 06328
Email: info@readycomputing.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
There are no constraints. With any modern browser and internet connection, Channels360 can be implemented into any customer's environment.
System requirements
  • Current/recent version (n-2) of any modern browser
  • Internet connection

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times differ based on the severity of the issue. Weekend/after-hours support depends on the level of severity.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat features include real-time chat, proactive chat invitations, customizable chat button, chat window docking, real-time typing view, chat history, maximum queue length, and internal chat messenger. Users can also choose a department to chat with.
Web chat accessibility testing
Ready has a thorough understanding of accessibility requirements, especially as they relate to Information and Communication Technology (ICT). Since January 2017, when the Access Board updated accessibility requirements for Web Content Accessibility Guideline s (WCAG) to the 2.0 AA standard, we have actively found ways to integrate these requirements into our product and service offerings to be as compliant as possible.

We also strive to make our products and services as accessible and simple to use as possible. This includes conforming to federal, state, and local ICT compliance requirements. Specific areas of focus include communication methods, graphical user interface appearance of products, general navigation of any of our products, and simplified color schemes. These are only some of the key aspects we look for when integrating and infusing accessibility compliance standards into our products and services.
Onsite support
Yes, at extra cost
Support levels
Ready offers IT managed services to fully manage a client's operational environment, including your application and IT infrastructure. We offer Tier 1 and 2 support models and Tier 3 vendor management to assist clients at multiple levels. Whether you require on-site or remote support, our support team is available to assist you.

All three support tiers are included in our Wellbase Services.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Ready has a mature, proven implementation methodology honed through the extensive experience of our team members. The five stages of our process are:
Discover: The team defines use cases, technical architecture, and requirements with the client to align with the business objectives of the solution.
Design: The requirements defined in the Discover stage are transformed into a solution design and documented in a Solution Design Document.
Build: The technical team installs and configures the solution based on the solution design document and conducts unit testing throughout the process.
Validate: The work performed during the Build stage undergoes comprehensive testing, including quality, integrated, and user acceptance testing (UAT).
Deploy: At the conclusion of UAT, the solution is published to the production environment and brought to a live state.

This five-stage process ensures both Ready and client resources are fully coordinated under a process that includes the checks and balances essential to a successful delivery.

At the end of implementation, Ready ensures the solution is appropriately transitioned. We will review support plans with the client and fully transition the solution from our Implementation Team to our Operations Team. Users will be trained on the solution and provided full documentation.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Microsoft Word
End-of-contract data extraction
We will extract the data for the client and transition it to the subsequent provider per the terms of the contract.
End-of-contract process
Based on the terms and conditions of the client's contract, as the contract end date nears, we will send the client notification of renewal/termination. At that point, we will work with the client to transition their data and services. There are no additional costs related to ending a contract or renewal.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
There are no differences between mobile and desktop service, as Channels360 is accessed via mobile browser.
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
Web application with responsive design.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Ready products comply with U.S. Section 508 and WCAG. We consistently design, construct, develop, and maintain facilities, technology, programs, and services from the onset so that all people, including people with disabilities, can fully and independently use them. This includes proactive engagement with users and efforts to modernize infrastructures to support the rapid adoption of technological innovations.

To meet this mandate, we use internal policies and online validation tools to ensure our products meet and exceed these accessibility guidelines.
API
Yes
What users can and can't do using the API
Channels360 is founded on a powerful platform that provides several fundamental back-end components, including APIs through which consumer applications access data. Data is collected through an inbound interface—either a listener for input submitted by a source or a consumer that retrieves data from a batch or on-demand source.

The platform uses a rich process for ingesting data. Once normalized, data is mastered into optimized dictionaries in a registry. Nonmastered data is persisted in the edge gateways and repository. Specialized versions of data are stored in the analytics engine. Like inbound interfaces, outbound interfaces support real-time and batch integration patterns and implement common standards.

All data managed in the platform is accessible by authorized consumer applications via APIs published on the service bus, which may be standards-based APIs such as IHE and FHIR, or custom APIs.

We make it easy to get started. Connecting to data sources can be as simple as plugging in an adapter or deploying an API to a data source.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Ready can configure many elements specifically for the client. Channels360 provides simple, intuitive web tools that don't require custom development so users can create custom assessments and workflows. Channels can be configured for virtually any use case, and Ready can optionally customise additional features.

The client determines the types of users and roles, and grant access privileges accordingly. The level of configuration allowed can then be assigned as the client sees fit.

Scaling

Independence of resources
Ready monitors performance aspects at every angle. In real time, we could adjust performance factors to increase or decrease performance based on user demand.

Analytics

Service usage metrics
Yes
Metrics types
Basic metrics provided include number of programs, cases, individuals/subjects including ad hoc reports on vitually any data collected and stored by the system.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data extracts are available for privileged users.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Availability is typically guaranteed at 99.5% available, with no greater than 1% decrease in availability over a one-month period. Availability is applicable to unexpected outages. Specifics related to the guarantee and refund are determined per contract.
Approach to resilience
By using global hosting providers, we take advantage of mass economics of resiliency.
Outage reporting
We will email and call the client per agreed-upon SLAs. In addition, the outage would be displayed in the client portal.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Business requirements for access control are determined based on the data and systems each employee or third party needs to perform their job responsibilities; authorization policies of the data and system asset owners; and applicable governmental policy and directives. Adherence to these requirements keeps systems and data secure by reducing vulnerabilities to data loss, compromised data, and other security incidents. Requests for access to Ready data and systems are submitted to Information Security for evaluation and approval. Access requests must state the business requirements to be met by access controls. We use the principle of least privilege.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
QAS International
ISO/IEC 27001 accreditation date
16/03/2024
What the ISO/IEC 27001 doesn’t cover
Ready is cerified to the ISO 27001 standard with no exemptions.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Ready has a corporate information privacy and security policy that governs our operations. We follow these guiding principles when developing and implementing information security controls:
• We strive to protect the confidentiality, integrity, and availability of our information assets and those of our clients.
• We comply with applicable privacy and data protection laws.
• We balance the need for business efficiency with the need to protect sensitive, proprietary, or other confidential information from undue risk.
• We grant access to sensitive, proprietary, or other confidential information only to those with a need to know and at the least level of privilege necessary to perform their assigned functions.
• Recognizing that an astute workforce is the best line of defense, we provide security training opportunities and expert resources to help individuals understand and meet their information security obligations.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All change requests must be documented. Depending on the nature of the change, the request is submitted to local management for approval or to the Change Advisory Board (CAB). In either case, an evaluation of the current and potential impact of the change on any other company governance documents, IT services, and IT and information security configuration items are performed.

After assessment, if the change is deemed acceptable, it will be authorized by the appropriate local manager or by the CAB. Once implemented, the change will be reviewed, and subject to the findings of the review, closed.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Ready's Privacy and Security Officer is charged with maintaining a process to identify and track applicable vulnerabilities, scan devices for current patch status, and advise system administrators. They schedule any necessary updates using standard change management processes and according to risk level, and they make all Ready-owned devices available to InfoSec for timely patching and related activities.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We use a third party to perform all advanced cybersecurity services. Through proactive and continuous monitoring of internal and external transactions, we can identify real and potential compromises. We respond as quickly as possible, no longer than 30 minutes after identification.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Ready has an incident handling policy which governs how we handle real or potential incidents. This policy includes:
• Incident reporting
• Incident response and mitigation
• Breach notification

Users report incidents to their support team. We provide incident reports via self-service, client dashboard, email, and other requested methods.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Tackling economic inequality

Ready tackles economic inequality by helping organisations to lessen health disparities caused by socio-economic factors, such as lack of housing, food insecurity, ethnicity, and other Social Determinants of Health (SDoH). For example, we integrate clinical, SDoH, and other relevant data to support healthcare and social care professionals, in particular with our Lot 2 Cloud Software Channels360 workflow and care coordination solution.

Equal opportunity

Ready helps organisations provide equal opportunity for healthcare services by implementing integrated health IT and data solutions to help inform their care. Solutions, such as our Lot 2 Cloud Software Channels360 workflow and data management offering lessens health disparities caused by socio-economic factors, such as lack of housing, food insecurity, ethnicity, and other Social Determinants of Health (SDoH) by integrating clinical, SDoH, and other relevant data to aid in decision-making.

Wellbeing

Ready implements solutions to promote whole health and well-being which includes both clinical and socio-economic factors. Solutions, such as our Lot 2 Cloud Software Channels360 workflow and data management offering, promotes wellbeing by providing organisations with data and tools to improve individual and community health. Channels360 integrates clinical, Social Determinants of Health (SDoH), and other relevant data to make the data "actionable" - automating and prioritising care for individuals.

Pricing

Price
£1,000 a licence
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@readycomputing.com. Tell them what format you need. It will help if you say what assistive technology you use.