Skip to main content

Help us improve the Digital Marketplace - send your feedback

Pathway Analytics

Sexual Health Tariff Grouper - Commissioner

The integrated Sexual Health Tariff Grouper Commissioner service for commissioners enables local authority public health commissioners of sexual health services to review charges raised based on locally agreed tariffs by participating providers - all at the click of a button.

Features

  • Granular anonymised charging data for your residents
  • Inclusion of cross-charged data from participating out-of-area providers
  • Easy billing reconciliation
  • Independent and reliable data validation
  • Easy implementation of local tariff arrangements
  • Simple data extracts
  • Data analytics
  • Automated alerts of hosted provider activity and charges
  • Identification of hosted clinics within Local Authority area
  • Reliable online service

Benefits

  • Receive charging data within weeks of delivered activity
  • Easily validate cross charged bills from out of area providers
  • Identify changing public health issues within weeks
  • Link charges to activity to understand return on investment
  • Link charges to patient demographics to develop public health strategy
  • Access common, reliable data from providers to facilitate commercial discussions
  • Test proposed tenders with historical activity

Pricing

£750 to £900 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at charles.hewitt@pathwayanalytics.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 5 7 0 9 0 8 3 6 7 9 7 6 1 1

Contact

Pathway Analytics Charles Hewitt
Telephone: 02033971004
Email: charles.hewitt@pathwayanalytics.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Accessed by modern web browsers over a standard secure (TLS v1.2) https connection. Subscriber accounts are associated with a valid individual email address.
System requirements
  • Secure https web connection using TLS v1.2
  • Modern web browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
48hrs during the working week, usually within 12 hrs.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
No
Support levels
We provide first line support via email, within 48hrs during the working week, we usually respond within 12 hrs. If necessary, we will initiate a telephone call back or online support session.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide one to one onboarding sessions where required. This usually involves a 45 minute online shared desktop session.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Data can be extracted by MS Excel data files at any point.
End-of-contract process
A subscriber account is suspended and access is removed from that account. Data submitted by the subscriber's organisation will remain available in the service unless we are requested by the organisation to remove it.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Reduced functionality. Limited ability to upload data files.
Service interface
No
User support accessibility
WCAG 2.1 A
API
No
Customisation available
No

Scaling

Independence of resources
The service is hosted on a highly scalable platform. All heavy comput action are performed as asynchronous actions in individual serverless containers called on demand.

Analytics

Service usage metrics
Yes
Metrics types
We provide a last logged in date time group for the subscriber. Internally, we record subscriber activity and access to data.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The subscriber organisation's data is available to the subscriber to download in MS Excel files by creating ad hoc or pre-defined reports.
Data export formats
Other
Other data export formats
.xlsx
Data import formats
  • CSV
  • Other
Other data import formats
.xlsx

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
Private Cloud

Availability and resilience

Guaranteed availability
Unplanned outages < 99.99% during UK office hours (9-5, m-f) in 365 days.
Subscriptions will be extended by 24x the number of hours unplanned outage experienced during the working week.
Approach to resilience
The service is built on a serverless architecture, each element can be independently initiated as required. Data is served from a multi-regional data center with regular backups and can be reinstated back to a point in time up to 30 days.
Outage reporting
We report outages, issues and changes in an update log.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Other
Other user authentication
One time, time-limited magic link sent to authenticated official email address of the subscriber (similar to standard password reset link). Where necessary, this is associated with a OTP sent to a validated mobile number. We also provide federated access control via recognised third party apps/services.
Access restrictions in management interfaces and support channels
All admin access is over VPN via federated access control.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We follow the guidance in the NHS Data Security and Protection Toolkit
Information security policies and processes
We follow the guidance in the NHS Data Security and Protection Toolkit

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We manage changes in a version controlled repository (github). Candidate new releases complete unit and function testing prior to release to production.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We monitor patch releases as they become available and deploy updates to dependent packages as required. We use tools such as npm audit to help identify vulnerable dependent packages.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We use third party services such as sentry.io and AWS WAF.
Incident management type
Supplier-defined controls
Incident management approach
We follow the NHS Data Security and Protection Toolkit guidance

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Our local technology footprint is powered by 100% renewable energy.

Pricing

Price
£750 to £900 a user a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at charles.hewitt@pathwayanalytics.com. Tell them what format you need. It will help if you say what assistive technology you use.