Skip to main content

Help us improve the Digital Marketplace - send your feedback

FEEBRIS LTD

Feebris - Virtual Health Platform

Feebris is a cloud based, device agnostic provider of solutions that enable remote monitoring. Wireless communication with devices allows our AI enhanced platform to evaluate the quality of the vitals being captured by users through our app in real time and provide feedback to achieve clinically reliable data.

Features

  • Easy to use smartphone app with full offline functionality
  • Various use cases (e.g. Care Homes, Virtual Wards, Community Care)
  • Wireless connected devices (e.g. Pulse Oximeter, BP Cuff etc.)
  • Wearables supported (e.g. Continuous ECG, Gait, Activity)
  • Automatic NEWS2 / Personalised Early Warning Score calculation
  • Tailored vital signs and response configuration (personalised baselines)
  • Workflow Management (Clinical dashboard, notifications, alerts)
  • EMR Integrations supported (e.g. EMIS, SystmOne, FHIR API)
  • Change Management Support & Optional clinical workforce
  • Quality assured health assessment

Benefits

  • Reduce unnecessary home visits (Hospital, GP, 111, 999)
  • Reduce length of stay
  • Identify and track deterioration to facilitate earlier intervention
  • Enable virtual MDT
  • Standardised and efficient communication across health and social care
  • Enable non-clinicians to capture clinically reliable data
  • Reduce unnecessary admissions / readmissions
  • Support integrated care by accessing all relevant patient data

Pricing

£50 a licence a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at eduardo@feebris.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 7 3 9 6 4 0 0 0 4 1 8 5 3 4

Contact

FEEBRIS LTD Eduardo Gallego
Telephone: 07946248619
Email: eduardo@feebris.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
None other than planned maintenance so long as the service is used as intended.
System requirements
None, we can provide all the necessary elements

User support

Email or online ticketing support
Email or online ticketing
Support response times
Standard Support
Monday - Friday, 9am - 6pm

Extra Support
Up to 24/7/365

Estimated response times are within 1 hour.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
In house testing only
Onsite support
Onsite support
Support levels
We provide comprehensive support covering all levels of support resolution. Our training is conducted in such a manner to enable admin users to address Level 0 and Level 1 support issues directly or with the support of our training articles, self help center and FAQ. Our team is readily available to support on any more challenging issues and the escalation of level 2 and level 3 queries.

All our deployments are supported with access to our clinical operations team that train and respond to all support queries. Access to engineers is available via our clinical operations team or account managers when required.

Additional support packages can be provided in line with our SFIA rate card.

Additional areas of support can be included dependent on project scope and requirements such as:
- Logistics for device collection, cleaning and delivery
- Remotely supported patient onboarding
- Bespoke feature / integration requirements
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide:
- Implementation
- Training (remote or in-person)
- Help hub
- Support
- Project Management
- Transformation & Change Management support
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Where integrations have been utilised, data will already have been shared and stored throughout the course of the contract.

In instances where integrations are not used, we can:

A) Retain the information, under a suitable agreement, for the healthcare system to access.

B) Provide a copy of the data to the customer by secure transfer. This is all included in the contract price.
End-of-contract process
We outline an exit plan with each client for which there are no additional costs. This includes:

Support or provide advanced notice communications to users
Work within agreed timeline for revoking access
Proceed with end of contract data extraction process as agreed

We understand that at times contracts have to come to an end. We do our best to accommodate requests to enable a smooth handover process that minimises operational disruption for our clients.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Yes
Compatible operating systems
Android
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile device is used for connecting to wireless medical devices and sensors.

Desktop provides access to the platforms dashboard
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
The interface allows our customers to:

- Manage access
- View dashboard
- View patient detail
- Personalise Care
- Respond to alerts
- Communicate with carers / patients
- Access support
- Provide guidance and support the capture vital signs
- Connect to medical devices
- Send communications between health / care staff and patients
- Receive notifications
- Answer soft signs questionnaires
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Usability testing with a representative user base.
API
Yes
What users can and can't do using the API
Highly configurable depending on client requirements. Most used functionality is:

User Authentication
Push and Pull of structured and unstructured patient data including via iFrame
Sharing and/or triggering of alerts and actions
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
During activation we would identify what configuration best supports the clients objectives. Depending on devices used, outcomes being monitored and goals for the project the app workflows can be tailored appropriately.

These requirements are mapped out during activation and can be changed during the deployment subject to appropriate change control. Configurable components include:

- Pathway, including questions, vitals and frequency of monitoring
- Alert triggers and display types
- Flags
- Wards / Organisation filters
- Bespoke baselines per patient
- Reporting
- Display Filters
- RBAC users

Scaling

Independence of resources
The service uses AWS Serverless technologies that can scale automatically when the service is under higher demand than normal.

Analytics

Service usage metrics
Yes
Metrics types
Our reporting offering is highly configurable and linked to the desired outcomes and operational requirements of our client.

Key reporting metrics across our contracts are:

System availability.
Adoption
Utilisation
Clinical activity
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
We support interoperability and integrations so that our data can be shared dynamically to support patient care.

Where integrations are not available, users can extract individual patient records via pdf to insert into the patients record.

Alternatively if a mass extraction is required, they can raise this with our support team who can provide segmented or complete downloads in a csv file format.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Feebris use reasonable endeavours to make the Services and Devices available at all times.

Exceptions are:
*planned maintenance carried out;
*any emergency maintenance as required.

As an indication for 2023 our availability was 99.9996% for our dashboard outside of scheduled maintenance.

Our application supports offline use and updates are pushed dynamically with no downtime.
Approach to resilience
Our platform is hosted on Amazon Web Services data centers and utilises elastic services such as RDS. This approach allows us to use multiple servers in different locations and so safeguards us against an outage / service disruption in one center.

Further information is available on request
Outage reporting
We have a public dashboard for monitoring service uptime, this is shared with our clients.

In the instance that we have an outage we have a process in place to communicate with all clients via E-mail alerts.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
The Feebris platform provides role based access controls. These are configurable by the user.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
DSPT - Standards Exceeded

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISMS that covers ISO 27001
QMS that covers ISO 13485

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All our changes are reviewed by at least 2 members of the team. Each release is versioned and stored. Our cloud infrastructure follows configuration as code best practices.

Through access to many different environments such as, production, development and staging we are able to test all configuration changes before releases go live.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We have automated checks of our dependent libraries conducted by our source code repositories provider.

We subscribe to multiple security notification systems and newsletters to inform and identify actions required.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We log every action performed within the system by users for auditing purposes.

We passively monitor critical points within the application, infrastructure and security services within the organisation. This triggers our robust alerting and escalation mechanism which ensures any activity outside of expected thresholds is flagged to the team.
Incident management type
Supplier-defined controls
Incident management approach
Incidents can be reported via any internal or external channel. On identification of an incident or suspected incident an incident report form is created. A data breach/incident response team is formed who first work to contain the incident to minimise further degradation, loss, destruction etc. In the case of a data breach this team works with a DPO, if applicable, to recover or delete affected data and notify affected insurers. The team assesses and records the incident and conducts root cause analysis to prevent future incidents. We update and maintain an incident log to track and monitor efficacy of response.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Scottish Wide Area Network (SWAN)
  • Health and Social Care Network (HSCN)

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Fighting climate change

- We recommend the use of high quality, long lived and re-usable/ rechargeable devices alongside our software
- We prioritise the avoidance or reduction of packaging alongside our services and set these standards on our suppliers
- The use of virtual care reduces travel requirements and avoidable conveyances
- We follow the 5 R methodologies within our processes internally (Refuse, Reduce, Reuse, Repurpose, Recycle) and use this to inform options proposed to our customers to support effective stewardship of our environment

Covid-19 recovery

- Our platform was deployed during the Covid pandemic to enable remote monitoring of care and nursing home residents to avoid the risk of infection for this vulnerable patient cohort.

- Support people and communities to manage and recover from the impacts
of COVID-19, including those worst affected or who are shielding.

- Support the physical and mental health of people affected by COVID-19,
including reducing the demand on health and care services.

Tackling economic inequality

- Create employment and training opportunities, particularly for people in
industries with known skills shortages or in high growth sectors.

- Support educational attainment relevant to the contract, including training schemes that address skills gaps and result in recognised qualifications.

- Create a diverse supply chain to deliver the contract including new
businesses and entrepreneurs, start-ups, SMEs, VCSEs and mutuals.

- Support innovation and disruptive technologies throughout the supply
chain to deliver lower cost and/or higher quality goods and services.

Equal opportunity

- Support in-work progression to help people, including those from
disadvantaged or minority groups, to move into higher paid work by
developing new skills relevant to the contract.

Wellbeing

- Our services enable a higher level of independence for patients during periods of exacerbations where they might otherwise require a stay in hospital or more health visits.

- Demonstrate collaboration with users and communities in the codesign and delivery of the contract to support strong integrated communities.

Pricing

Price
£50 a licence a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at eduardo@feebris.com. Tell them what format you need. It will help if you say what assistive technology you use.