Skip to main content

Help us improve the Digital Marketplace - send your feedback

QLOG TECHNOLOGIES LTD

Equipment/Operational Compliance Management

QLog offers a unique collection of equipment, task management, collaboration and reporting tools for staff to use in their everyday roles and digitises paper checking. Consequently, this leads to significant time efficiencies in hospital teams, enabling clients to easily prioritise, control, and communicate their work processes and resources.

Features

  • Real Time Location Services
  • Task/Procedure Management
  • Equipment/Asset Management
  • Real time alerts
  • Compliance Checks
  • Inventory Management
  • Process Visibility
  • Management Dashboards
  • QR Code Technology
  • GS1 Barcode Ready

Benefits

  • Improved equipment safety
  • Reduction in inventory and equipment wastage
  • Improved efficiency of task completion
  • Improved compliance rates
  • Improved visibility of operational readiness
  • Increased equipment utilisation
  • Significant staff time savings
  • Improved visibility of equipment
  • Improved Patient Safety
  • Improved Quality Assurance

Pricing

£5,000 a licence

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at amit@qlog.co. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 2 0 0 0 7 4 8 5 9 1 8 2 5 9

Contact

QLOG TECHNOLOGIES LTD Amit Lehavi
Telephone: (+972)0502061419
Email: amit@qlog.co

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
No
System requirements
Devices must have access to internet

User support

Email or online ticketing support
Email or online ticketing
Support response times
We aim to respond to none priority services required within 24 hours during working hours. Priority calls will be answered within 2 hours during working hours. During weekends and bank holidays service calls will be answered within 48 hours.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
QLog provide a customer success/technical support team that operates six days a week: Monday-Friday (9-5pm) and Sunday (7-3pm). We aim to respond to none priority services required within 24 hours during working hours. Priority calls will be answered within 2 hours during working hours. During weekends and bank holidays service calls will be answered within 48 hours.

The support levels provided are included in the initial contract price. Therefore it is not an additional fee and there is no ongoing service fee to use support.

We provide a team which consists of a customer success project manager and a technical account manager.
Support available to third parties
No

Onboarding and offboarding

Getting started
QLog works closely with the buyers team to collect all data and requirements as part of our onboarding service. The system is then configured accordingly following a series of workshops to build the platform to the customers specification. Following this onsite setup along with in person and online training is provided to support the users and management team to become familiar with how the system should be interacted with. Detailed user documentation is provided to support with the procedures and tasks required to be completed within both the mobile and desktop application.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
The QLog technical support team can provide bulk downloads of data collected during the contract period. However users are able to extract data while using is CSV format.
End-of-contract process
All end-of-contract processes are included within in the price of the contract. There are no additional costs if the decision is made to end the contract.

If the contract was to end, we have a process of transferring all of the data back to the organisation. All data belongs to the organisation and we keep audits of the entire length of work together.

Every Trust is different, and all have different processes. We would discuss this process with the customer to ensure the process is smooth and you get all of the data from the work we've done together in an efficient manner.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The mobile application is used by the front end user completing tasks and the desktop application is used by administer and manage the services provided.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
No
Customisation available
Yes
Description of customisation
QLog can be customised in a number of different ways to ensure that it is bespoke to the organisation utilising the solution.

Users can create predefined processes for specialist checks/equipment. Users can also create bespoke questionnaires that relate to a specific tasks.

All of this is put into customisable reports and dashboards to ensure that staff see the insights that mean the most to them.

Permissions to customise the admin system on QLog are granted to NHS staff members so they have autonomy over managing their own service. Additionally, the service can work with QLog and the team at QLog can customise the system based on the service's requests.

Scaling

Independence of resources
QLog distributed architecture for data collection, processing and reporting allows it to scale horizontally as the number of clients and volume of traffic increase. QLog uses multiple monitoring processes and tools to continuously track network resources, operating systems, applications and capacity. Systems are load balanced and scaled up when predetermined capacity thresholds are reached.

Analytics

Service usage metrics
Yes
Metrics types
The system monitors when task execution takes place along with the time taken to complete specified procedures. The system can be configured to run schedules against specific tasks/procedures to provide compliance metrics.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
There is functionality with the desktop application to export data captured directly.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We offer a best effort guarantee inside our SLA. This means, we will do everything we can to ensure our services are online 100% of the time, however we do not make any specific guarantees. We always aim for 100% availability, and in reality these services have an uptime record of 99.98% over the past 3 years - less than 2 hours downtime per year.
Approach to resilience
Available on request
Outage reporting
QLog experiences few outages. In the event of an outage, we promptly report through email alerts. Each email alert includes a formal explanation of the outage's cause, our plans for resolution and improvement, as well as assurances regarding our next steps to mitigate any resulting impacts.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Each user is provided individual logins and then roles and permissions are used at each level to restrict or grant access as necessary.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
The Standards Institution of Israel
ISO/IEC 27001 accreditation date
24/01/2024
What the ISO/IEC 27001 doesn’t cover
Not applicable
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • DTAC
  • DSP Toolkit

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
QLog information security management system is based on ISO 27001. QLog maintains a general Information Security Policy, updated annually, that explicitly addresses the confidentiality, integrity and availability of client data and information technology resources, and details employee's responsibilities and managements' role.

Comprehensive technical policies govern various aspects of QLog SaaS Operations and corporate, which policies define security measures appropriate to the sensitivity of the data processed.

Policies are approved by senior management, communicated to all affected Personnel to whom the policies apply, and clearly state the consequences of non-compliance. All employees must review and sign QLOG' Information Security Policy during onboarding.

QLOG has adopted a decentralised approach to information security. QLOG's IT Director coordinates all security and privacy activities within QLOG. Responsibilities of this position include:

Driving security initiatives
Policy review
Security planning and program management
Review effectiveness of the security program
Coordinate QLOG security incident response plan
Perform annual security and privacy assessment and reviews
Implementation of security controls rests with the management of each relevant function. QLOG separates its SaaS Solutions production network and all associated functions from the general corporate IT. QLOG IT Director is responsible for policies and security implementation within the SaaS environment.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
QLog follows formal change management processes. All changes to the production environment (network, systems, platform, application, configuration, including physical changes such as equipment moves) are tracked/implemented by a dedicated team. All key business owners such as Technical Support, Engineering, DevOps, Security, and SaaS Operations are represented at the daily change management meeting. All deployments into production or change to the production environment (network, systems, platform, application, configuration, etc.) must be submitted to, reviewed and approved by the change management meeting team prior to implementation. QLOG operates an automated code deployment and configuration management system for its SaaS Solutions infrastructure.
Vulnerability management type
Undisclosed
Vulnerability management approach
QLOG subscribes to manufacturers and independent security notification services to monitor potential external threats.

Vulnerabilities are logged as defects, resolved or mitigated, and verified and fixed.

Manual and automated vulnerability testing is performed during the development process. QLOG engages an independent third party security firm annually to conduct a vulnerability scan of all external-facing (public) infrastructure devices and application penetration test of its solutions.

QLOG uses in depth defence best practices and validates them using both internal and third party security vulnerability scans.

Our internal quality assurance function tests all application end-points for vulnerabilities, including those in OWASP Top Ten.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Network-based intrusion detection systems (IDS) monitor network traffic for intrusion, and QLOG SaaS Operations personnel utilise multiple monitoring tools to continuously scan for errors or suspicious activities. QLOG's hosted environment is separate from its corporate counterpart, accessible only to authorised SaaS Operations staff with separate authentication credentials. Centralised logging and monitoring systems enable alerting, trend analysis, and risk assessment. A network configuration management tool tracks changes, which are reviewed. Escalation procedures ensure timely communication of security incidents through the management chain and to affected clients.
Incident management type
Supplier-defined controls
Incident management approach
QLOG implements a robust Security Incident Response Process (SIRP) to swiftly and effectively address security and privacy incidents. The SIRP framework outlines deployment procedures, severity criteria, investigation workflows, documentation requirements, and contact information. Led by senior executives reporting directly to the CEO, the SIRP core team is activated and disbanded as needed, convening regularly for training and maintenance. Incidents are categorised based on severity, with tailored responses for critical, significant, and benign events. Following industry standards, the SIRP process encompasses six phases: Identification, Triage, Containment, Eradication, Recovery, and Notification, ensuring prompt action, containment, resolution, and client communication within defined timeframes.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Wellbeing

Fighting climate change

By utilising QLog, our customers are contributing to fighting climate change.

We enable hospitals/departments to go paperless ensuring that checks on equipment and other procedures essential for safety and departmental readiness are digital.

Wellbeing

By using QLog, organisations not only streamline essential check procedures within hospitals but also prioritise the wellbeing of their staff. Currently, nursing staff are overwhelmed with extensive manual checks on equipment, rooms, temperatures, and various essential processes, which significantly impacts their workload and ultimately, their wellbeing. With QLog, these burdens are significantly alleviated. For instance, in a resuscitation service, we've reduced the time needed for daily checks on adult resuscitation trolleys from 2 minutes to just 15 seconds, and a full inventory check that previously took 30 minutes now averages only 8.8 minutes. This reduction in time spent on these tasks translates to a significant reduction in stress and workload for your staff, enabling them to allocate more time and energy to patient care, thus fostering a healthier work environment and enhancing overall staff wellbeing. Through these targeted interventions and support mechanisms, we've effectively cut staff burnout rates by 50% at a 1400 bed hospital.

Pricing

Price
£5,000 a licence
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at amit@qlog.co. Tell them what format you need. It will help if you say what assistive technology you use.