Argyle Digital Microscopy Services Platform
Argyle Digital Microscopy Services (DMS) is an online web-based service aimed at NHS Trusts, Independent Pathology providers and Educational Bodies. The service is based on a modular platform and available on a per seat or storage basis.
Features
- Access from any internet connection from your browser
- Upload share and display of whole slide image (WSI)
- Storage of WSI
- Annotation of WSI with download in XML/CSV
- Construction of educational modules/tutorials based around digital slides
Benefits
- Publish and access WSI from any internet connected device
- Conduct teaching sessions on publicly available or institutionally owned WSI
- Comprehensive permission structure allowing sharing of slides appropriately
- Use preconfigured system or custom front end
Pricing
£6,000 to £30,000 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
5 0 4 7 4 8 3 1 0 0 0 9 1 7 3
Contact
Argyle IT Consulting Ltd
Arjun Dhillon
Telephone: +447788425875
Email: arjun.dhillon@nhs.net
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Community cloud
- Service constraints
- Support is limited to the support channels, service hours and the supported browsers outlined in the service definition document.
- System requirements
-
- Internet Connection
- Compatible browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Please see service definitions for details of support levels provided.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Please see service definition document for the details of support levels provided.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Users can start using the service following an online registration process to create a new user account.
Once their registration is approved, user can access user documentation within the system. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
Users can download their documents anytime during the contract period.
An offboarding service is provided as an optional service at the end of the contract for providing customer data in an electronic format at an additional cost. - End-of-contract process
-
At the end of the contract, the services and data will cease to be accessible to the users. Customer data will be retained for a period of 120 days to enable the customer to reactivate the service without additional costs.
Any services required at the end of the contract will be provided at an additional cost to the customer.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Service is provided via a browser both on mobile and desktop devices.
There is no difference in functionality between mobile and desktop devices provided a compatible browser is used. - Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Each customer instance of the service is allocated dedicated minimum resources to serve the contracted user base.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide service metrics on number of active users per month and data storage utilisation
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Imports and exports are limited to documents for the document library. Users can upload and download their documents using the browser interface.
- Data export formats
- Other
- Data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- No availability guarantee is provided as part of this service.
- Approach to resilience
- Service is provided on a resilient infrastructure with geographic redundancy. Details are available on request.
- Outage reporting
- Service outages are reported via email and/or SMS alerts to agreed users.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- A full granular role base access is used for managing access controls across the entire system.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Our security governance framework is designed to meet the control objectives of the Cyber Essential scheme.
- Information security policies and processes
-
We have information security policies and protocols covering hardware configuration management, firewalls, monitoring, access controls and management, protection from malicious code, password management, acceptable use, systems vulnerability testing, acceptable use and information classification and handling. Each policy and procedure has a defined owner and approver and outlines responsibilities for auditing and monitoring compliance where applicable.
In addition, we undertake regular internal and external penetration testing through an independent third party to ensure any deviations from these policies are protocols that have not been identified internally are detected and rectified.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Each software component is tracked from creation using version control with each version of the code archived when replaced/updated.
We carry out internal penetration testing after each version update and we contract a third party to carry out penetration testing following each major update. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
- We carry out routine penetration testing internally and commission third party service following major upgrades. We subscribe to vendor's alert and update services for server and database systems. Critical patches are usually tested and applied within 24 hours.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
Servers, firewalls, network traffic and ports are monitored using automated alert systems. Different thresholds are set for alerts depending on the component.
Critical alerts are usually responded to within 1 hour. - Incident management type
- Undisclosed
- Incident management approach
- Please see service definition document for the details of the incident support process.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Covid-19 recovery
-
Covid-19 recovery
Our services are are all Healthcare focused. They are designed to reduce costs for the health service, improve patient outcomes & reduce provider burden. This directly supports COVID19 recovery by improving efficiency and productivity of healthcare organisations.
Pricing
- Price
- £6,000 to £30,000 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No