Wheelchair Tracking Service
Wheelchair management software is vital for organizations and facilities that provide wheelchair services. This software streamlines the process of managing wheelchair inventory, tracking assignments, scheduling maintenance, and improving overall efficiency. By digitizing and automating these tasks, wheelchair management software enhances accessibility and ensures smooth operations.
Features
- Wheelchair Management -commissioning to decommissioning
- Wheelchair Features - allocations/dealloacations
- Purchase Order Management
- Work Order - Reactive, Preventive - Parts, Time Tracking
- Contract/License Management
- Barcoding/QR Code - GS1 Ready
- Inventory Tracking
- Wheelchair Library and Wheelchair Loan Management
- Document Management - Safety Alerts and Manuals
- Cloud Solution - Unlimited assets, users
Benefits
- Control, Manage and track Assets and Improved Regulatory Compliance
- Increase Wheelchair Life Cycle -by tracking PM, Reactive Jobs
- Real Time Spend analysis and Capital Budgeting
- Identify ghost Wheelchair and Efficiently audit assets by location
- Remove spread sheets - Secure data on Cloud
- Accelerate maintenance planning
- Effective use of time
- Improve life cycle management
- Real time Stock Tracking
- 360 Degree view of Wheelchair Information
Pricing
£4,999.00 an instance a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 4 2 6 0 3 0 0 2 3 4 5 6 2 7
Contact
WT DATATECH LTD
Dileep Iarala
Telephone: 07738729304
Email: dileep.iarala@memss.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No Constraints work Any Cloud service provider but Planned maintenance is typically scheduled outside of regular business hours.
- System requirements
-
- Subscription to Cloud Service
- Internet Browser
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- MEMSS Client Support group will make every reasonable effort to ensure that submitted cases are assigned the proper level of Severity. Submitted cases will be responded to in the order in which they are received, with consideration given for higher Severity levels. Response Time is the time it takes before a MEMSS Support agent makes initial contact with the individual who submitted case. Bundled Service (Normal Priority 6 Hours, Serious Priority 3 hours, Critical Priority Live Call Only) Concierge Standard (Normal Priority 4 Hours, Serious Priority 2 hours, Critical Priority Live Call Only)
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We include support within our annual fee. We will allocate both technical account manager and cloud support engineer
Standard Support - available during 09:00 – 17:00 hours, Monday to Friday (not English Public Holidays). Incidents may be logged via the web, telephone or email during these times. Additionally, Incidents may be logged via email or the web outside of these hours, but they will not be progressed until the next working day. we also support out of hours for priority issues. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Application is web based can accessible any where. Our onboarding starts reviewing your business processes as they are mapped to MEMSS functionality and we will configure as per your requirements and Then we will provide training as per your requirements.
During the implementation phase we will train your core project team to have a strong understanding of the system. Your project team will learn how data is structured in the solution, the available configuration options within the standard product and how the specific processes operate. We offer both classroom and webinar training. After commencement of live use of the software, you will have access to a wealth of expertise via the support staff who are eager to assist with client questions and queries related to the system. You will also have access to our documentation and user guides in addition to the client support team. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Database used is SQL Server and the SQL backup (.bak file) will be provided if required at the end of the contract.
- End-of-contract process
- Following termination of the contract , buyer shall certify that it has returned or destroyed all copies of the MEMSS processes and Documentation provided and confidential information of MEMSS and acknowledges that its rights to use the same are relinquished. If required we can also provide the data in other standard formats, this will be an additional cost option for the buyer to choose at contract end. The cost will be determined by the export format required and the volume of data to be exported.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Look and feel will verify to desktop service to mobile service. but can do all the tasks which can see in desktop version
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
We can Provide API access to Assets and Work order information.
Limitations is depends on the service selected. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Reference Data
Workflow Process
We can customise to client requirements.
Scaling
- Independence of resources
- Service usage alerts has been stepped and our service cloud based. We can increase allocation services as demand increases.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Summary metrics including
No Of Assets and various metrics
No of Work Orders and various usage metrics
Financial - Capital replacement metrics
Usage metrics
Performance reporting on KPIs
Resource management including time-sheet reporting
Custom reports available subjected to service agreement. - Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
The data is exported as a set of comma-separated values (CSV) files. Data export tools provide a convenient way to obtain a copy of your Asset data, either for backup or for importing into a different system.
From Reports also you can export data in various formats (Csv/excel/XML etc) - Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We use Azure Cloud which is provided by Microsoft.
https://azure.microsoft.com/en-gb/support/legal/sla/
and also our internal team available to support the application availability twenty -four (24) hours a day, seven (7) days a week. - Approach to resilience
- We utilise a Azure Cloud environment built using the App service Management platform. It provides an environment that is: - Scalable through auto-scaling (up and out) - Highly available through automatic failover and full active-active High Availability. The application will be hosted in multi-node environment and this will protect from bringing the system down for any reason.
- Outage reporting
- Outage are reported to our clients by email .
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Not Applicable
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
-
MEMSS have the following security policies and processes in place: Information & Security policy, Data Attack Preparedness and Response process and Data and Netwrok Security Breach Incident Management policy Incident response is conducted by the IT Directors of the company with input from other members of the Data, Application and Infrastructure Architectural teams dependent on the type and scale of the issue with policies reviewed and testing completed regular basis, as a minimum.
As part of staff on-boarding, we train the staff on the importance of security measures and train them to respond to computer and network security incidents.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We follow standard development Configuration and change management process includes GitHub Source Control and Asana for issue tracking to monitor and track features and fixes.
All Change Requests must be submitted in accordance with change management procedures . Each Change Request must receive formal CAB approval before proceeding with the change and it will be created in Asana for tracking (Development, Deployment, 1st and 2 nd level Testing, Release to Test and Live) - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Application Logs created to a logfile and to database on every event based are monitored regularly. Patches are deployed when required. Potential threats are identified offline and online and with regular vulnerability scanning.
Multilocation data backup and we have in place Disaster Recovery procedures and management process in all times. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Protective monitoring controls include recording the logs with time real time stamp with system information and logs suspicious activity at a module level.
Full time in house testing with various tools/methods this will include the data, network, penetration and stress testing. - Incident management type
- Supplier-defined controls
- Incident management approach
-
All staff are trained and made aware of the incident management process which includes reporting the incident
Priority 1, Critical: System down and Critically Impacts to all business activities.
Priority 2, Functional failure: Prevent operation of particular functionality and not usable.
Priority 3, Intermittent failure: The problem is affecting a particular functionality and impacting limited users but the problem is relocatable.
Priority 4, Minor:. Very low impact to users or the problem is cosmetic.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Fighting climate change
WT Datatech support in cloud services has significantly impacted the well-being of our staff, our client's staff, and the local communities we serve. With the rise of remote work, we prioritize physical, social, and mental health through our Wellbeing Strategy and Policy. This strategy aims to cultivate a happy and confident workforce that delivers exceptional customer service while positively impacting our communities, whether remotely or in-office. Our initiatives are tailored to meet the needs of our staff, identified and developed accordingly. To ensure the health and happiness of our employees, we have:
Established a network of trained mental health first aiders to assist colleagues across our contracts.
Fostered a supportive environment that promotes wellbeing through mindfulness and wellness activities each month, with ongoing employee feedback and engagement.
Created an environment that supports wellbeing, maintaining a culture of engagement to ensure a happy and confident workforce that delivers exceptional services and positively impacts our communities, whether working remotely or in-office.Covid-19 recovery
Covid-19 recovery
Thanks to our cloud technology strategy, when COVID-19 struck, we seamlessly transitioned to remote working with minimal disruption to our services. Since then, our model has evolved into hybrid working. Our offices now offer smaller, modern spaces where teams can work permanently (if unable to work from home) or for essential face-to-face engagements. We've implemented all COVID-19 regulations within these offices, including social distancing measures, one-way walkways, sanitization stations, and informative posters. Despite these changes, our operational performance remained unaffected, allowing us to continue providing Business as Usual (BAU) services, ensuring continuity for our clients' management software needs. WT Datatech has supported our clients and employees throughout the pandemic, contributing to local communities where possible by offering employability advice and educational support through university programs.Tackling economic inequality
Tackling economic inequality
With a solid commitment to social value and addressing economic inequality, WT Datatech pledges to uphold the following throughout the contract:
WT Datatech understands the challenges that small or new businesses face in their growth journey. We recognize that providing IT Management software can sometimes hinder their operations or ability to secure new business. That's why we offer comprehensive support, including free workshops to identify compliance gaps and assist in developing policies and procedures to meet IT Management software standards. We aim to effectively support businesses of all sizes, offering cost-effective rates and additional assistance to ensure their success.
Through our operating model, which leverages remote working via cloud services, we create opportunities for those facing barriers to employment and individuals in deprived areas. We provide training opportunities for Consultants and other staff as needed, ensuring inclusivity and equal access to advancement. Additionally, we have established CPD pathways to facilitate professional progression.
WT Datatech is dedicated to addressing economic inequality and collaborates with buyers to explore new and innovative methods of breaking down barriers.Equal opportunity
Our commitment to equality and diversity is not just a statement but a comprehensive policy that we live by. This policy covers Staff Training & Development, monitoring, effective employee communication, and equality-focused training. It is a policy and a promise aligned with all legislation surrounding equal opportunities. We are committed to ensuring this is reflected in our services, and we take pride in the fact that our policy is incorporated into staff contracts and is briefed during staff inductions.
Through our robust equal opportunities, diversity, and inclusion policies, we go beyond mere compliance. We actively tailor our services to provide equal opportunities, reflecting the unique demographics and characteristics of the population across the areas in which we operate. We understand that each community is different and value and respect these differences in our approach.Wellbeing
Our cloud support services have significantly contributed to the well-being of our staff, client staff, and the local communities in which we operate. As remote work becomes more prevalent, we prioritize physical, social, and mental health through our Wellbeing Strategy and Policy. This strategy aims to foster a happy and confident workforce that delivers excellent customer service and contributes to the sustainable transformation of our local communities, whether working from home or in-office. These initiatives are tailored to meet the support needs of our staff. To ensure employee health and happiness, we have:
An established network of trained mental health first aiders is available across our contracts to assist colleagues.
We maintain a culture of well-being through engagement, offering a variety of mindfulness and wellbeing activities each month. We continuously consult with and invite employee feedback to tailor our initiatives effectively.
Pricing
- Price
- £4,999.00 an instance a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- It includes all features with a basic configuration. Max 30 days we will provide a trial.