Sexual Health Tariff Grouper - Commissioner
The integrated Sexual Health Tariff Grouper Commissioner service for commissioners enables local authority public health commissioners of sexual health services to review charges raised based on locally agreed tariffs by participating providers - all at the click of a button.
Features
- Granular anonymised charging data for your residents
- Inclusion of cross-charged data from participating out-of-area providers
- Easy billing reconciliation
- Independent and reliable data validation
- Easy implementation of local tariff arrangements
- Simple data extracts
- Data analytics
- Automated alerts of hosted provider activity and charges
- Identification of hosted clinics within Local Authority area
- Reliable online service
Benefits
- Receive charging data within weeks of delivered activity
- Easily validate cross charged bills from out of area providers
- Identify changing public health issues within weeks
- Link charges to activity to understand return on investment
- Link charges to patient demographics to develop public health strategy
- Access common, reliable data from providers to facilitate commercial discussions
- Test proposed tenders with historical activity
Pricing
£750 to £900 a user a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 5 7 0 9 0 8 3 6 7 9 7 6 1 1
Contact
Pathway Analytics
Charles Hewitt
Telephone: 02033971004
Email: charles.hewitt@pathwayanalytics.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Accessed by modern web browsers over a standard secure (TLS v1.2) https connection. Subscriber accounts are associated with a valid individual email address.
- System requirements
-
- Secure https web connection using TLS v1.2
- Modern web browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 48hrs during the working week, usually within 12 hrs.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
- We provide first line support via email, within 48hrs during the working week, we usually respond within 12 hrs. If necessary, we will initiate a telephone call back or online support session.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide one to one onboarding sessions where required. This usually involves a 45 minute online shared desktop session.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Data can be extracted by MS Excel data files at any point.
- End-of-contract process
- A subscriber account is suspended and access is removed from that account. Data submitted by the subscriber's organisation will remain available in the service unless we are requested by the organisation to remove it.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Reduced functionality. Limited ability to upload data files.
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- The service is hosted on a highly scalable platform. All heavy comput action are performed as asynchronous actions in individual serverless containers called on demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide a last logged in date time group for the subscriber. Internally, we record subscriber activity and access to data.
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The subscriber organisation's data is available to the subscriber to download in MS Excel files by creating ad hoc or pre-defined reports.
- Data export formats
- Other
- Other data export formats
- .xlsx
- Data import formats
-
- CSV
- Other
- Other data import formats
- .xlsx
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- Private Cloud
Availability and resilience
- Guaranteed availability
-
Unplanned outages < 99.99% during UK office hours (9-5, m-f) in 365 days.
Subscriptions will be extended by 24x the number of hours unplanned outage experienced during the working week. - Approach to resilience
- The service is built on a serverless architecture, each element can be independently initiated as required. Data is served from a multi-regional data center with regular backups and can be reinstated back to a point in time up to 30 days.
- Outage reporting
- We report outages, issues and changes in an update log.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Other
- Other user authentication
- One time, time-limited magic link sent to authenticated official email address of the subscriber (similar to standard password reset link). Where necessary, this is associated with a OTP sent to a validated mobile number. We also provide federated access control via recognised third party apps/services.
- Access restrictions in management interfaces and support channels
- All admin access is over VPN via federated access control.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We follow the guidance in the NHS Data Security and Protection Toolkit
- Information security policies and processes
- We follow the guidance in the NHS Data Security and Protection Toolkit
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We manage changes in a version controlled repository (github). Candidate new releases complete unit and function testing prior to release to production.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We monitor patch releases as they become available and deploy updates to dependent packages as required. We use tools such as npm audit to help identify vulnerable dependent packages.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We use third party services such as sentry.io and AWS WAF.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We follow the NHS Data Security and Protection Toolkit guidance
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Our local technology footprint is powered by 100% renewable energy.
Pricing
- Price
- £750 to £900 a user a year
- Discount for educational organisations
- No
- Free trial available
- No