Patient feedback, analytics and governance platform
Doctify allows healthcare providers to collect and publish verified patient feedback and surveys allowing patients to find the very best doctor or hospital for their needs and healthcare providers better understand their patients' experience.
Features
- Real-time reporting
- Feedback and survey collection
- Patient experience analytics
- Patient feedback publishing
- Consultant performance management
- Patient information access
- Remote access
Benefits
- Publish patient feedback
- Trust and transparency in healthcare
- Information is a determinant of healthcare outcomes
- Enhance patient experience
- Strengthen online reputation
- Improve staff morale
- Improved patient feedback collection rates
- Consultant, department, hospital, regional, national benchmarking
- Access your patients' feedback already on Doctify
- Improve online healthcare information
Pricing
£499 a licence
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 7 8 1 9 7 0 1 1 2 4 2 7 7 1
Contact
Doctify
David Johnson
Telephone: +44 7903 206551
Email: david@doctify.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
-
We do perform planned platform upgrades and maintenance. All vendors are informed well in advance and implemented with their sign off.
We have a target platform up time of 99%.
Planned service constraints take place overnight. - System requirements
- Web based platform accessed on current hardware
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Users during weekdays get responses within 3 minutes of contacting the support via chat.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
-
However we are used by patients in a daily basis and have daily user interface monitoring in place with feedback loops including monitoring user behavior, drop off and user interviews to ensure the best experience that is accessible to all patients.
We monitor accessibility scores on a weekly basis and all designs are tested and deployed only once they pass an accessibility score.
We also have voice assisted technology as part of our patient feedback journey. - Onsite support
- Onsite support
- Support levels
-
We have an online technical team available via phone and video and a customer support team that provide both face to face and online support.
All support is included in our fees. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- All Doctify users have a dedicated account manager to provide training either onsite or online, depending on your preference. Doctify users have unlimited access to their account manager. User documentation is also provided.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- All data collected from Doctify can be downloaded by CSV file at any time.
- End-of-contract process
- All feedback data is shared with the client. Otherwise no actions are required to end the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No differences
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
-
There is a live dashboard for monitoring patient feedback in real time.
All feedback is categorised by location, treatment and consultant. - Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- TBC
- API
- Yes
- What users can and can't do using the API
-
The core service does not require API usage
There is an optional API service.
Users need to be authenticated to do changes to their account.
Those that wish to use it have no Limitations on user available actions. - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Users can customise their profile by default they can also appoint other individuals to do so for them if required.
Scaling
- Independence of resources
- We are using a global server service provider that can scale as required.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Yes, our service provides comprehensive usage metrics to help customers monitor and optimise their use of our platform.These are accessible through our user-friendly dashboard to ensure customers have the latest information
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can request and recieve all their data by emailing dpo@doctify.co.uk
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
Doctify users can guarantee availability 97% of the time. Our current up time is over 99%
We have a live chat function and phone helpline which is staffed during UK business hours 8am - 6pm.
Should Doctify fall below this amount the client may withhold a Service Credit representing 10% of the monthly service charge if any of the above Service Levels are not met within any given calendar month. Should there be 2 failures within 3 months additional service credits will be paid, representing the difference between any monthly service credits already paid during those months and such amount as represents 20% of the monthly service charges due for that 3 month period. - Approach to resilience
- This information is available upon request.
- Outage reporting
-
Our customer service team provides email alerts for planned and unplanned outages to clients.
A public dashboard will alert users to known outages.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Our approach to restricting access in management interfaces and support channels is centered around robust authentication and granular access controls, ensuring that only authorized personnel can access sensitive functions. We utilize a separate internal authentication system integrated with Google Identity Provider, which serves as a secure method for verifying the identities of our team members. Access to management consoles is not granted automatically; instead, it must be provisionally approved, ensuring a deliberate and controlled access assignment process.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Designate a Information Security Officer - ISO
Create a comprehensive list of security policies that align with business requirements and are approved by executive level individuals.
Adopt recognized security Standards such as CIS-CAT and NIST to structure the governance of the security program
Conduct Risk Assessments
We regularly conduct risk assessments and develop mitigation strategies.
Conduct Yearly Penetration Tests and Implement Continuous Security Testing of our code
Provide Security Awareness Training and Clearly outline security responsibilities across the organization.
Conduct Audits and Reviews
Use KPIs and KRIs to track effectiveness of the security governance program. - Information security policies and processes
- Our information security policies and processes are aligned with ISO standards, ensuring a comprehensive and systematic approach to managing sensitive company and customer information. We maintain a clear reporting structure with a dedicated Information Security Officer (ISO) overseeing policy compliance and enforcement. To ensure adherence to our policies, we conduct regular training sessions for all employees, perform continuous monitoring, and carry out periodic audits. Non-compliance is addressed through a structured remediation process, including retraining and, if necessary, disciplinary action. This framework guarantees that our information security practices are consistently applied and continuously improved.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Our configuration and change management approach is centered around a Continuous Integration/Continuous Deployment (CI/CD) pipeline, augmented with rigorous security testing to ensure the integrity and security of our services throughout their lifecycle. Each component of our service is tracked from development to deployment, with version control systems documenting every change.
Changes undergo a review process, including an assessment of potential security impacts. This is facilitated by automated security scans and manual reviews as part of our CI/CD pipeline. Additionally, we implement an internal process where all changes are logged and managed through a ticketing system, ensuring traceability and accountability. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
We continuously assess potential threats through automated scanning tools and intelligence from leading industry sources, including CVE databases and security advisories.
Upon identifying vulnerabilities, our dedicated team evaluates the severity and potential impact on our services, prioritising patches based on risk. Critical patches are deployed within 24 hours, while less severe updates follow a scheduled maintenance window. We source our threat intelligence from reputable security research organisations (Rapid7, NCC Group Threat Intelligence) and participate in relevant security communities (OWASP London) to stay informed about emerging threats, ensuring our services remain secure against the latest vulnerabilities. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Our protective monitoring strategy employs advanced detection tools and processes to swiftly identify potential security compromises. Utilizing intrusion detection systems (IDS) and continuous monitoring, we can detect anomalies and signs of unauthorised activity. Upon detection, our incident response team is immediately notified and remediate the threat. We prioritise rapid response, aiming to address critical incidents within hours of detection. This approach ensures the security and integrity of our services, minimising the impact of any potential compromise on our operations and our clients. Continuous improvement and adaptation of our monitoring processes keep us resilient against evolving threats.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our incident management process includes pre-defined protocols for common security events, ensuring swift and effective response to incidents. Users can report incidents through a dedicated support channel, accessible via email, web portal, ensuring ease of reporting and prompt action. Upon receiving an incident report, our specialised incident response team follows a structured approach to address and mitigate the issue, guided by our comprehensive incident management policies. We provide detailed incident reports to stakeholders, summarising the nature of the incident, the response actions taken, and recommendations for preventing future occurrences.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
Doctify is an entirely paperless company and provides cycle to work schemes for emplyees.Equal opportunity
Doctify is an equal opportunity employer and we consider applications from all backgrounds.Wellbeing
Doctify provides employees with all legally mandated benefits as well as:
Continuous learning sessions, training programmes and self-development (‘Doctify's Healthcare Heroes', ‘Learn from Leaders', soft-skills, career expertise, etc.)
Transparent internal mobility opportunities and career paths for professional hyper-growth
28 days annual leave: 25 days leave + 3 days off between Christmas and New Year (plus bank holidays) + 1 day annual leave for each year of service after 1 year (up to 30 days)
4 weeks remote-working to be used throughout the year (within 3 hours of your local HQ)
Hybrid-working, flexible-working hours
Enhanced Parental leave
Pricing
- Price
- £499 a licence
- Discount for educational organisations
- No
- Free trial available
- No