Better Meds
Better Meds is an award-winning electronic prescribing and medication administration solution that is easy to embed – into both your workflow and the technologies you are already using.
Better Meds brings efficiency, transparency and decision support to medication management.
Features
- Medication reconciliation
- Inpatient and Outpatient prescribing
- Discharge summary
- Order sets
- Medication administration record
- Allergy Module
- Clinical pharmacist review
- Pharmacy integration
- Prescriber's task list
- Administration audit trail
Benefits
- Reduction in prescribing and transcription errors
- Reduction in medicines administration errors and omitted doses
- Improved patient safety due to legibility and clinical decision support
- Enables pharmacists to efficiently manage their workload and monitor performance
- Cost and efficiency savings
- Quality improvement
- Advances digital maturity
- Enables the move to paperless
- Compatible with any EPR
- Integrates with you decision-support, labs and pharmacy systems
Pricing
£100,000 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 8 8 3 6 8 4 3 5 5 0 6 0 2 5
Contact
BETTER LIMITED
Brian Murray
Telephone: 07464414405
Email: ukitenders@better.care
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
1. Better Platform: incl. vendor-neutral CDR, OpenEHR standards, clinical models
2. Better EHR Studio: low-code environment to create clinical applications
3. Regional Medication Management: Connect all ICS care providers to create a shared medication list
4. EoL care planning: supports care planning at all levels of care including patient inputs. - Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- This product does not have any constraints that buyers should know about, however details on environment specifications will be discussed on contract award.
- System requirements
-
- Windows or Linux server
- Clinical decision support
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Severity 1
Target response time - 4 business hours
Target remote restoration time - 1 business day
Target resolution time - 30 business days
Severity 2
Target response time - 8 business hours
Target remote restoration time - 2 business day
Target resolution time - Next release
Severity 3
Target response time - 2 business days
Target remote restoration time - N/A
Target resolution time - N/A
Out of Hours support SLA would be agreed at contract discussions. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Support Levels:
- Standard Business Hours, excluding Weekends and Bank Holidays
- Additional out of hour support can be discussed in more detail depending upon your specific requirements
- All contracts will have direct access to an Account Manager, who will ensure the appropriate technical technical/cloud support is available. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Online and on-site training and documentation is provided. Better provide full project management presence in form of a Prince II-qualified project manager, product specialist and project team throughout the implementation to the point of Pilot close. We recommend the Trust provide at least one FTE project management / change management resource. We provide a wide variety of training which includes: on-site training, web training, eLearning, train the trainer as well as continuous refresher courses, walkthrough documents, video help and online material. In our training sessions, we aim to focus on: the transfer of skills, knowledge and capabilities that enable the Trust to perform as much in-house training as possible. Our regular training approach is therefore centred on internal Trust trainers and super users with regular staff being trained during the pilot and rollout period by in house trainers. It is expected that the Trust will deliver all training to new standard users via its own IT Trainers, who will have been trained by the supplier. Supplier training staff may observe training sessions at the start to support the Trust’s IT trainers and enhance supplier awareness of issues which users find difficult.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Better will document an Exit Plan. The Exit Plan will consist of appropriate documents, which would be selected from the following:
• List of handover documentation
• Data extract details
• Transition Out Checklist
• Pro-forma Transition Out schedule
• Roles and responsibilities for Transition Out process
• Transition Out governance framework
• Template of monthly SLA reporting
• Client Operations Support Guide, which includes the help desk and escalation procedure.
• Web certificates and their expiry dates - End-of-contract process
-
Better's aim is to ensure all data and documentation is handed over to the Trust in a format that is usable and understandable. Better will provide a draft exit plan when required, which would include the following documents, where appropriate:
• List of handover documentation
• Data extract details
• Transition Out Checklist
• Pro-forma Transition Out schedule
• Roles and responsibilities for Transition Out process
• Transition Out governance framework
• Template of monthly SLA reporting
• Client Operations Support Guide, which includes the help desk and escalation procedure.
• Web certificates and their expiry dates
The established Transition Out checklist will be used to determine that all activities associated with the Transition Out have been completed. It will provide the record of handover and acceptance.
The Authority Transition Project Manager will meet with the Transition Project Managers from each Contractor to ensure that all concerns and issues have been met and addressed appropriately. Once the Authority Transition Project Manager has formally accepted the Transition Out, the checklist and supporting documentation will be signed and accepted by the Authority as per local approval procedures.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- APIs allows data extraction and manipulation.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
The solution is configurable as part of the implementation based on the need of the customer. Various parameters that drive how the application behaves can be set.
Users can make local configuration changes to the drug dictionary.
Scaling
- Independence of resources
- Horizontal and vertical scaling are supported. All services are stateless and can be load balanced.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
- With security policy and encryption.
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
The solution allows customers to extract data into a BI data warehouse in a denormalized report ready format.
All data is accessible via OpenEHR standard APIs. - Data export formats
- Other
- Other data export formats
-
- Extraction into database (MSSQL, Oracle, Postgres)
- REST APIs (JSON, XML)
- Data import formats
- Other
- Other data import formats
- REST APIs (JSON, XML)
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Our system provides 99.9% availability. This excludes infrastructure failures.
- Approach to resilience
-
High availability is achieved with proxies and load balancing. Every service is replicated to enable upgrades without any downtime and to increase the resistance to the system.
In the case of power, network or system failure, Better Meds provides a business continuity mechanism so the work can continue without any information or data loss. - Outage reporting
- Any outage is reported through emails.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Other
- Other user authentication
- Token authentication
- Access restrictions in management interfaces and support channels
- Application-level role-based access control.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Other
- Description of management access authentication
- OAuth
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- SIQ - Slovenian Institute of Quality and Metrology
- ISO/IEC 27001 accreditation date
- 22/07/20
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO 9001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
The Company is compliant with ISO/IEC 27001 standards. It has also several security policies, instructions and processes in place. There are policies regarding protection of information, personal data protection, exchange of information, access of information, physical controls and other in force. In addition, there are also procedures for organization of data security, asset management, communication and production management, security incidents and Business continuity planning (BCP) in place. Special concern is dedicated to personal data protection.
All documents are available to all employees on company’s intranet/SharePoint. Owner of the documents is also always available for any specific clarification.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Our change management approach is aligned with ITIL.
All change management is reviewed against a DCB0129 process. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We have a number of services that discover, continuous monitor, mitigate and inform about potential security risks to protect your organization from modern IT attacks.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We provide a number of proactive monitoring tools to identify any faults and compromises. These will alert appropriate support channels for action. As part of the incident management process, these will respond to within the agreed Service Level Agreements.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Better has implemented ITIL based incident management process for implementation. Incidents are handled within agreed service level agreements (SLAs).
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Information to be provided as per request. - Covid-19 recovery
-
Covid-19 recovery
Information to be provided as per request. - Tackling economic inequality
-
Tackling economic inequality
Information to be provided as per request. - Equal opportunity
-
Equal opportunity
Information to be provided as per request. - Wellbeing
-
Wellbeing
Information to be provided as per request.
Pricing
- Price
- £100,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We would provide sandbox access should the user wish to explore the functionality. This would be on a time limited basis and we could discuss this in more detail at the time.