Lot 2 Channels360 Cloud Software
Channels360 is a care management solution. It combines clinical care coordination and access to community services to address SDoH to enable care providers to coordinate care between clinicians, partner organisations, community care offerings, and citizens through the design and implementation of care pathways that coordinate point of care and recipients.
Features
- Real-time event processing
- Intuitive program modeler to define programs and tasks
- Real-time workflow management and ad hoc task generation
- At-a-glance program and team performance review capabilities
- Resource locator with list and map views, distance calculation
- Digital Front Door with optional account creation and profile management
- Automated service matching to available community resources
- Closed-loop referrals
- Care coordination builder
- Community resource management
Benefits
- Integration across the ICS at place, neighbourhood, and systems levels
- Single, easily customisable, shared view of complex data and pathways
- Secure in-app, SMS, and email messaging
- Patient engagement, experience, and outcomes management
- Automated alerts, flags, and notifications
- Real-time clinical, referrals, and other events of interest
- Governance of clinical, social, and other protocols
- Coordination with existing systems and software
- EPR companion
- Secure, powerful data integration via SMART on FHIR
Pricing
£1,000 a licence
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 1 3 1 0 8 7 3 8 3 9 2 5 1 3
Contact
READY COMPUTING LIMITED
Philip Colbourne
Telephone: 020 755 06328
Email: info@readycomputing.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- There are no constraints. With any modern browser and internet connection, Channels360 can be implemented into any customer's environment.
- System requirements
-
- Current/recent version (n-2) of any modern browser
- Internet connection
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times differ based on the severity of the issue. Weekend/after-hours support depends on the level of severity.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Web chat features include real-time chat, proactive chat invitations, customizable chat button, chat window docking, real-time typing view, chat history, maximum queue length, and internal chat messenger. Users can also choose a department to chat with.
- Web chat accessibility testing
-
Ready has a thorough understanding of accessibility requirements, especially as they relate to Information and Communication Technology (ICT). Since January 2017, when the Access Board updated accessibility requirements for Web Content Accessibility Guideline s (WCAG) to the 2.0 AA standard, we have actively found ways to integrate these requirements into our product and service offerings to be as compliant as possible.
We also strive to make our products and services as accessible and simple to use as possible. This includes conforming to federal, state, and local ICT compliance requirements. Specific areas of focus include communication methods, graphical user interface appearance of products, general navigation of any of our products, and simplified color schemes. These are only some of the key aspects we look for when integrating and infusing accessibility compliance standards into our products and services. - Onsite support
- Yes, at extra cost
- Support levels
-
Ready offers IT managed services to fully manage a client's operational environment, including your application and IT infrastructure. We offer Tier 1 and 2 support models and Tier 3 vendor management to assist clients at multiple levels. Whether you require on-site or remote support, our support team is available to assist you.
All three support tiers are included in our Wellbase Services. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Ready has a mature, proven implementation methodology honed through the extensive experience of our team members. The five stages of our process are:
Discover: The team defines use cases, technical architecture, and requirements with the client to align with the business objectives of the solution.
Design: The requirements defined in the Discover stage are transformed into a solution design and documented in a Solution Design Document.
Build: The technical team installs and configures the solution based on the solution design document and conducts unit testing throughout the process.
Validate: The work performed during the Build stage undergoes comprehensive testing, including quality, integrated, and user acceptance testing (UAT).
Deploy: At the conclusion of UAT, the solution is published to the production environment and brought to a live state.
This five-stage process ensures both Ready and client resources are fully coordinated under a process that includes the checks and balances essential to a successful delivery.
At the end of implementation, Ready ensures the solution is appropriately transitioned. We will review support plans with the client and fully transition the solution from our Implementation Team to our Operations Team. Users will be trained on the solution and provided full documentation. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- Microsoft Word
- End-of-contract data extraction
- We will extract the data for the client and transition it to the subsequent provider per the terms of the contract.
- End-of-contract process
- Based on the terms and conditions of the client's contract, as the contract end date nears, we will send the client notification of renewal/termination. At that point, we will work with the client to transition their data and services. There are no additional costs related to ending a contract or renewal.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There are no differences between mobile and desktop service, as Channels360 is accessed via mobile browser.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Web application with responsive design.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
Ready products comply with U.S. Section 508 and WCAG. We consistently design, construct, develop, and maintain facilities, technology, programs, and services from the onset so that all people, including people with disabilities, can fully and independently use them. This includes proactive engagement with users and efforts to modernize infrastructures to support the rapid adoption of technological innovations.
To meet this mandate, we use internal policies and online validation tools to ensure our products meet and exceed these accessibility guidelines. - API
- Yes
- What users can and can't do using the API
-
Channels360 is founded on a powerful platform that provides several fundamental back-end components, including APIs through which consumer applications access data. Data is collected through an inbound interface—either a listener for input submitted by a source or a consumer that retrieves data from a batch or on-demand source.
The platform uses a rich process for ingesting data. Once normalized, data is mastered into optimized dictionaries in a registry. Nonmastered data is persisted in the edge gateways and repository. Specialized versions of data are stored in the analytics engine. Like inbound interfaces, outbound interfaces support real-time and batch integration patterns and implement common standards.
All data managed in the platform is accessible by authorized consumer applications via APIs published on the service bus, which may be standards-based APIs such as IHE and FHIR, or custom APIs.
We make it easy to get started. Connecting to data sources can be as simple as plugging in an adapter or deploying an API to a data source. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Ready can configure many elements specifically for the client. Channels360 provides simple, intuitive web tools that don't require custom development so users can create custom assessments and workflows. Channels can be configured for virtually any use case, and Ready can optionally customise additional features.
The client determines the types of users and roles, and grant access privileges accordingly. The level of configuration allowed can then be assigned as the client sees fit.
Scaling
- Independence of resources
- Ready monitors performance aspects at every angle. In real time, we could adjust performance factors to increase or decrease performance based on user demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Basic metrics provided include number of programs, cases, individuals/subjects including ad hoc reports on vitually any data collected and stored by the system.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data extracts are available for privileged users.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Availability is typically guaranteed at 99.5% available, with no greater than 1% decrease in availability over a one-month period. Availability is applicable to unexpected outages. Specifics related to the guarantee and refund are determined per contract.
- Approach to resilience
- By using global hosting providers, we take advantage of mass economics of resiliency.
- Outage reporting
- We will email and call the client per agreed-upon SLAs. In addition, the outage would be displayed in the client portal.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Business requirements for access control are determined based on the data and systems each employee or third party needs to perform their job responsibilities; authorization policies of the data and system asset owners; and applicable governmental policy and directives. Adherence to these requirements keeps systems and data secure by reducing vulnerabilities to data loss, compromised data, and other security incidents. Requests for access to Ready data and systems are submitted to Information Security for evaluation and approval. Access requests must state the business requirements to be met by access controls. We use the principle of least privilege.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QAS International
- ISO/IEC 27001 accreditation date
- 16/03/2024
- What the ISO/IEC 27001 doesn’t cover
- Ready is cerified to the ISO 27001 standard with no exemptions.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Ready has a corporate information privacy and security policy that governs our operations. We follow these guiding principles when developing and implementing information security controls:
• We strive to protect the confidentiality, integrity, and availability of our information assets and those of our clients.
• We comply with applicable privacy and data protection laws.
• We balance the need for business efficiency with the need to protect sensitive, proprietary, or other confidential information from undue risk.
• We grant access to sensitive, proprietary, or other confidential information only to those with a need to know and at the least level of privilege necessary to perform their assigned functions.
• Recognizing that an astute workforce is the best line of defense, we provide security training opportunities and expert resources to help individuals understand and meet their information security obligations.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
All change requests must be documented. Depending on the nature of the change, the request is submitted to local management for approval or to the Change Advisory Board (CAB). In either case, an evaluation of the current and potential impact of the change on any other company governance documents, IT services, and IT and information security configuration items are performed.
After assessment, if the change is deemed acceptable, it will be authorized by the appropriate local manager or by the CAB. Once implemented, the change will be reviewed, and subject to the findings of the review, closed. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Ready's Privacy and Security Officer is charged with maintaining a process to identify and track applicable vulnerabilities, scan devices for current patch status, and advise system administrators. They schedule any necessary updates using standard change management processes and according to risk level, and they make all Ready-owned devices available to InfoSec for timely patching and related activities.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We use a third party to perform all advanced cybersecurity services. Through proactive and continuous monitoring of internal and external transactions, we can identify real and potential compromises. We respond as quickly as possible, no longer than 30 minutes after identification.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Ready has an incident handling policy which governs how we handle real or potential incidents. This policy includes:
• Incident reporting
• Incident response and mitigation
• Breach notification
Users report incidents to their support team. We provide incident reports via self-service, client dashboard, email, and other requested methods.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
Ready tackles economic inequality by helping organisations to lessen health disparities caused by socio-economic factors, such as lack of housing, food insecurity, ethnicity, and other Social Determinants of Health (SDoH). For example, we integrate clinical, SDoH, and other relevant data to support healthcare and social care professionals, in particular with our Lot 2 Cloud Software Channels360 workflow and care coordination solution.Equal opportunity
Ready helps organisations provide equal opportunity for healthcare services by implementing integrated health IT and data solutions to help inform their care. Solutions, such as our Lot 2 Cloud Software Channels360 workflow and data management offering lessens health disparities caused by socio-economic factors, such as lack of housing, food insecurity, ethnicity, and other Social Determinants of Health (SDoH) by integrating clinical, SDoH, and other relevant data to aid in decision-making.Wellbeing
Ready implements solutions to promote whole health and well-being which includes both clinical and socio-economic factors. Solutions, such as our Lot 2 Cloud Software Channels360 workflow and data management offering, promotes wellbeing by providing organisations with data and tools to improve individual and community health. Channels360 integrates clinical, Social Determinants of Health (SDoH), and other relevant data to make the data "actionable" - automating and prioritising care for individuals.
Pricing
- Price
- £1,000 a licence
- Discount for educational organisations
- No
- Free trial available
- No