SIDQAM LTD
Direcht Care Planning
Direcht Care provides a fully customised digital care planning solution
Features
- Food and Drink Management
- Medication
- Medication Administration Record
- Body Map
- Personalised Care Plans
- Oral Care
- Deterioration Monitoring and Escalation
- Health Visits
- Care Home Dashboard
- Handover
Benefits
- Easily View Resident Past Records
- Enable easy handover between care givers
- Created unlimied personalised care plans
- Quickly access residents care plans
- Access through mobile, tablet and computer
- Quickly generate reports for audits and inspections
Pricing
£3.99 to £5.99 a licence
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at direcht@sidqam.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
4 0 5 8 3 3 8 4 2 2 4 6 6 6 3
Contact
SIDQAM LTD
Business Development Unit
Telephone: 0161 818 4614
Email: direcht@sidqam.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- None relating to the intended use of the service.
- System requirements
- Device with Internet Browser and Internet Connection
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 3 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- We have tested our Online Chat functionality with a wide demographic of users.
- Onsite support
- Yes, at extra cost
- Support levels
-
• Email and phone support is available 9 to 5 (UK time), Monday to Friday
• Onsite Support is available at an extra cost - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Training is provided as part of the implementation project. The Care Home/ Care Group should nominate clinical champions / expert users to deal with routine queries after implementation. Documentation is also provided, and there are help articles within the system. Direcht Care is intuitive, based on current recording methods, so will be familiar to care givers.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The data stored from our systems is usually pushed back into existing EPR. If no system exists, a copy of new data collected will be stored on the server housed at the trust; the care home/care group always has access and control of its data. If the care home/care group chooses not to use the Direcht Care, the data would remain accessible on the trust server.
- End-of-contract process
- All data will be extracted from the system and provided to the Care Home/ Care Group in JSON/XML format. Once the Care Home/ Care Group confirms safe receipt of data on their systems Sidqam Ltd will destroy all the data present on our servers and provide a written confirmation of the same. Data extraction in another format other than JSON/XML will incur a an additional cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Direcht Care can work via web browser on mobile, tablet and computer devices with an active internet connection.
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- No
- Customisation available
- Yes
- Description of customisation
- Direcht Care offers a tailored digital care planning platform designed to meet the unique needs of care and nursing homes. During the implementation phase, we collaborate closely with each facility to activate the specific modules they need. We also fine-tune escalation protocols and email notification systems to ensure they are both appropriate and accurate for their operations.
Scaling
- Independence of resources
- Direcht Systems provide both vertical and horizontal scaling. The system has been designed to manage large volumes of patient transactions in an efficient manner. The use of ISO13606 as the underlying architecture provide the flexibility to scale and adopt.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide a series of metrics based on data available. However trusts can define metrics they wish to view, the reporting tools are included in the software.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- Data is stored in a way that demographic data and clinical data are stored in different set of tables. They are only linked at run-time with the two factor authentication.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- The Direcht systems provide an out of box reporting tools accessible via its web version which can be exported to Microsoft Excel for further analysis. We work with the admin user / team to help define data the requirement and the standards used for export. This is our data extraction services for customers wishing to analyse more complex criteria. We also provide a data analytics service with can be purchased separately.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- JSON
- XML
- HL7
- Data import formats
- Other
- Other data import formats
-
- JSON
- XML
- HL7
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Application availability 98% with a threshold of 96%. Infrastructure downtime or other incidents within Force Majeur, planned or unplanned, is excluded from this calculation.
- Approach to resilience
- Available on request. Resilience provided by underlying hosting platform.
- Outage reporting
- E-mail alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
• Username and two-factor authentication
• Role Base Access Controls (RBAC) - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Sidqam Ltd is committed to ensuring security governance is given the highest level of importance. We have consultants who have worked in the security and information governance domain and are helping us to achieve the ISO/IEC 27001 certification.
- Information security policies and processes
- Our Information Security management System is used as a tool to assist us to identify and comply with business and legal/regulatory requirement and contractual security obligations. All Procedures are reviewed once a year to make sure they comply. All staff are required to comply with our information security guidelines.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our configuration and change management processes services are aligned to ITIL. All build and configuration assets are version controlled using source control. All changes are peer reviewed by at least two others and UAT performed before being merged into the base codebase.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We do in-house penetration testing. Any known vulnerabilities should be patched within 24 hours. In addition we have robust vulnerability management processes in place within Microsoft Azure to identify, triage, and mitigate vulnerabilities.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Realtime monitoring is in place to monitor potential compromises. Microsoft Azure communicates any data breach if it becomes aware of such. Escalation processes are in place once any compromise is identified. The degree of compromise will determine resource allocation and urgency of response. In most cases any compromise will be addressed immediately.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Customers can phone or email with incidents. We use an incident management tool (Zoho) that has built-in reporting.
In addition we also have procedures for
- Conducting risk assessments for discovered security incidents.
- Notify clients in the event a security incident occurs.
- Revising our annual Security Risk Analysis and Risk Management Plan as necessary.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We strongly encourage our staff to prioritize consideration when traveling for work. Additionally, whenever feasible, we opt for remote client meetings. Our company policy emphasizes an 'online first' approach.
Pricing
- Price
- £3.99 to £5.99 a licence
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at direcht@sidqam.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.