Feebris - Virtual Health Platform
Feebris is a cloud based, device agnostic provider of solutions that enable remote monitoring. Wireless communication with devices allows our AI enhanced platform to evaluate the quality of the vitals being captured by users through our app in real time and provide feedback to achieve clinically reliable data.
Features
- Easy to use smartphone app with full offline functionality
- Various use cases (e.g. Care Homes, Virtual Wards, Community Care)
- Wireless connected devices (e.g. Pulse Oximeter, BP Cuff etc.)
- Wearables supported (e.g. Continuous ECG, Gait, Activity)
- Automatic NEWS2 / Personalised Early Warning Score calculation
- Tailored vital signs and response configuration (personalised baselines)
- Workflow Management (Clinical dashboard, notifications, alerts)
- EMR Integrations supported (e.g. EMIS, SystmOne, FHIR API)
- Change Management Support & Optional clinical workforce
- Quality assured health assessment
Benefits
- Reduce unnecessary home visits (Hospital, GP, 111, 999)
- Reduce length of stay
- Identify and track deterioration to facilitate earlier intervention
- Enable virtual MDT
- Standardised and efficient communication across health and social care
- Enable non-clinicians to capture clinically reliable data
- Reduce unnecessary admissions / readmissions
- Support integrated care by accessing all relevant patient data
Pricing
£50 a licence a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 7 3 9 6 4 0 0 0 4 1 8 5 3 4
Contact
FEEBRIS LTD
Eduardo Gallego
Telephone: 07946248619
Email: eduardo@feebris.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None other than planned maintenance so long as the service is used as intended.
- System requirements
- None, we can provide all the necessary elements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Standard Support
Monday - Friday, 9am - 6pm
Extra Support
Up to 24/7/365
Estimated response times are within 1 hour. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- In house testing only
- Onsite support
- Onsite support
- Support levels
-
We provide comprehensive support covering all levels of support resolution. Our training is conducted in such a manner to enable admin users to address Level 0 and Level 1 support issues directly or with the support of our training articles, self help center and FAQ. Our team is readily available to support on any more challenging issues and the escalation of level 2 and level 3 queries.
All our deployments are supported with access to our clinical operations team that train and respond to all support queries. Access to engineers is available via our clinical operations team or account managers when required.
Additional support packages can be provided in line with our SFIA rate card.
Additional areas of support can be included dependent on project scope and requirements such as:
- Logistics for device collection, cleaning and delivery
- Remotely supported patient onboarding
- Bespoke feature / integration requirements - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide:
- Implementation
- Training (remote or in-person)
- Help hub
- Support
- Project Management
- Transformation & Change Management support - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Where integrations have been utilised, data will already have been shared and stored throughout the course of the contract.
In instances where integrations are not used, we can:
A) Retain the information, under a suitable agreement, for the healthcare system to access.
B) Provide a copy of the data to the customer by secure transfer. This is all included in the contract price. - End-of-contract process
-
We outline an exit plan with each client for which there are no additional costs. This includes:
Support or provide advanced notice communications to users
Work within agreed timeline for revoking access
Proceed with end of contract data extraction process as agreed
We understand that at times contracts have to come to an end. We do our best to accommodate requests to enable a smooth handover process that minimises operational disruption for our clients.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
- Android
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Mobile device is used for connecting to wireless medical devices and sensors.
Desktop provides access to the platforms dashboard - Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
-
The interface allows our customers to:
- Manage access
- View dashboard
- View patient detail
- Personalise Care
- Respond to alerts
- Communicate with carers / patients
- Access support
- Provide guidance and support the capture vital signs
- Connect to medical devices
- Send communications between health / care staff and patients
- Receive notifications
- Answer soft signs questionnaires - Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Usability testing with a representative user base.
- API
- Yes
- What users can and can't do using the API
-
Highly configurable depending on client requirements. Most used functionality is:
User Authentication
Push and Pull of structured and unstructured patient data including via iFrame
Sharing and/or triggering of alerts and actions - API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
During activation we would identify what configuration best supports the clients objectives. Depending on devices used, outcomes being monitored and goals for the project the app workflows can be tailored appropriately.
These requirements are mapped out during activation and can be changed during the deployment subject to appropriate change control. Configurable components include:
- Pathway, including questions, vitals and frequency of monitoring
- Alert triggers and display types
- Flags
- Wards / Organisation filters
- Bespoke baselines per patient
- Reporting
- Display Filters
- RBAC users
Scaling
- Independence of resources
- The service uses AWS Serverless technologies that can scale automatically when the service is under higher demand than normal.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Our reporting offering is highly configurable and linked to the desired outcomes and operational requirements of our client.
Key reporting metrics across our contracts are:
System availability.
Adoption
Utilisation
Clinical activity - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
We support interoperability and integrations so that our data can be shared dynamically to support patient care.
Where integrations are not available, users can extract individual patient records via pdf to insert into the patients record.
Alternatively if a mass extraction is required, they can raise this with our support team who can provide segmented or complete downloads in a csv file format. - Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Feebris use reasonable endeavours to make the Services and Devices available at all times.
Exceptions are:
*planned maintenance carried out;
*any emergency maintenance as required.
As an indication for 2023 our availability was 99.9996% for our dashboard outside of scheduled maintenance.
Our application supports offline use and updates are pushed dynamically with no downtime. - Approach to resilience
-
Our platform is hosted on Amazon Web Services data centers and utilises elastic services such as RDS. This approach allows us to use multiple servers in different locations and so safeguards us against an outage / service disruption in one center.
Further information is available on request - Outage reporting
-
We have a public dashboard for monitoring service uptime, this is shared with our clients.
In the instance that we have an outage we have a process in place to communicate with all clients via E-mail alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- The Feebris platform provides role based access controls. These are configurable by the user.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- DSPT - Standards Exceeded
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
ISMS that covers ISO 27001
QMS that covers ISO 13485
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All our changes are reviewed by at least 2 members of the team. Each release is versioned and stored. Our cloud infrastructure follows configuration as code best practices.
Through access to many different environments such as, production, development and staging we are able to test all configuration changes before releases go live. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We have automated checks of our dependent libraries conducted by our source code repositories provider.
We subscribe to multiple security notification systems and newsletters to inform and identify actions required. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We log every action performed within the system by users for auditing purposes.
We passively monitor critical points within the application, infrastructure and security services within the organisation. This triggers our robust alerting and escalation mechanism which ensures any activity outside of expected thresholds is flagged to the team. - Incident management type
- Supplier-defined controls
- Incident management approach
- Incidents can be reported via any internal or external channel. On identification of an incident or suspected incident an incident report form is created. A data breach/incident response team is formed who first work to contain the incident to minimise further degradation, loss, destruction etc. In the case of a data breach this team works with a DPO, if applicable, to recover or delete affected data and notify affected insurers. The team assesses and records the incident and conducts root cause analysis to prevent future incidents. We update and maintain an incident log to track and monitor efficacy of response.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Fighting climate change
- We recommend the use of high quality, long lived and re-usable/ rechargeable devices alongside our software
- We prioritise the avoidance or reduction of packaging alongside our services and set these standards on our suppliers
- The use of virtual care reduces travel requirements and avoidable conveyances
- We follow the 5 R methodologies within our processes internally (Refuse, Reduce, Reuse, Repurpose, Recycle) and use this to inform options proposed to our customers to support effective stewardship of our environmentCovid-19 recovery
- Our platform was deployed during the Covid pandemic to enable remote monitoring of care and nursing home residents to avoid the risk of infection for this vulnerable patient cohort.
- Support people and communities to manage and recover from the impacts
of COVID-19, including those worst affected or who are shielding.
- Support the physical and mental health of people affected by COVID-19,
including reducing the demand on health and care services.Tackling economic inequality
- Create employment and training opportunities, particularly for people in
industries with known skills shortages or in high growth sectors.
- Support educational attainment relevant to the contract, including training schemes that address skills gaps and result in recognised qualifications.
- Create a diverse supply chain to deliver the contract including new
businesses and entrepreneurs, start-ups, SMEs, VCSEs and mutuals.
- Support innovation and disruptive technologies throughout the supply
chain to deliver lower cost and/or higher quality goods and services.Equal opportunity
- Support in-work progression to help people, including those from
disadvantaged or minority groups, to move into higher paid work by
developing new skills relevant to the contract.Wellbeing
- Our services enable a higher level of independence for patients during periods of exacerbations where they might otherwise require a stay in hospital or more health visits.
- Demonstrate collaboration with users and communities in the codesign and delivery of the contract to support strong integrated communities.
Pricing
- Price
- £50 a licence a month
- Discount for educational organisations
- No
- Free trial available
- No