Patient Centred Care
Integrated, comprehensive, customisable incorporating healthcare management, health records, telemedicine, real-time patient monitoring and personalized treatment plans. Efficient marketplace of labs and imaging providers. Enhances accessibility, improves diagnostic accuracy. Proactive population health through data analytics and learning and healthy family habits.
Features
- Enables GP, hospital, leisure centre to collaborate for healthy families
- Electronic Health Records (EHR), Telemedicine Services and Patient Monitoring
- Personalized Treatment Plans, Appointment Scheduling
- Configurable modules and open APIs for integration and extension
- Multi-channel Communications remind, inform, nudge healthy choices
- Enables multiple family and patient touch points. “Longevity Leap” synergy
- Compliance and Security. “CitizenID” synergy for security and personalisation
- Integrated billing systems and value for money purchasing
- Configurable Mobile Health Applications
- Patient Centred Care synergy with our veterinary service
Benefits
- Enhances care coordination, healthcare access
- Preventive health dividend by coordinating with services beyond NHS
- Enables early health issue detection for timely intervention
- Enhances treatment effectiveness
- Empowers active patient participation and improves satisfaction
- Provides insights for informed decision-making
- Streamlines billing processes where applicable
- Enhances patient ownership, empowered engagement, results and satisfaction
- Ensures data protection and legal compliance
- Offers convenience and constant health management access.
Pricing
£22,487 to £37,979 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 4 4 6 0 9 3 1 1 3 0 7 4 8 0
Contact
Gaiasoft International Limited
Morel Fourman
Telephone: 02076924035
Email: morel.fourman@gaiasoft.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- The service is a SaaS service and can also be hosted on-premise on most Linux and Windows Operating Systems. Linux systems are preferred.
- System requirements
- Not applicable as its a SaaS platform
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We have a Service Level Agreement based ticketing support.
Priority 1 tickets are responded to within 4 hours
Priority 2 tickets are responded to within 6 hours
Priority 3 tickets are responded to within 8 hours - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
-
1 Chatbot & FAQ Access: Our web chat features an intelligent chatbot equipped with a comprehensive FAQ module. Users can query this system for instant information about navigating and utilizing the platform. However, the chatbot is limited to providing information available in its database and cannot offer personalized medical advice. We can provide support for WhatsApp for business as on-demand integration.
2. Human Assistance: If the query exceeds the chatbot’s capabilities or requires personal interaction, the chatbot is designed to triage and seamlessly escalate the issue by connecting the user to a human agent. This ensures that complex concerns are addressed with a personal touch.
3. Ticketing Option: For issues that require further investigation or are not immediately resolvable, users have the option to open a support ticket directly through the chatbot. This feature is intended for non-urgent queries and users will receive a follow-up response based on the order the tickets were received. - Web chat accessibility testing
- NA
- Onsite support
- Yes, at extra cost
- Support levels
- We provide onsite training, installation, program build, program operate and program transfer support, if required
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We have multiple modes of training:
a) Onsite training in the form of "Train the Trainer" and provide them with adequate resources to train the rest of the staff.
b) Self Service through our Knowledge Base which has training videos on how to use the application.
c) Regular monthly training as a part of the monthly calendar to train new staff. (This is available on a chargeable basis.) - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The data can be exported in Excel / CSV formats.
- End-of-contract process
- We extract the data by module and provide them in a CSV / Excel Format. If we have to provide the data in any other format, it would be chargeable on a time and material basis based on data size and the effort estimates as shared to do such extraction. The effort will be estimated, and signed off and then the extraction will proceed. The prices will be defined in the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile, iPad and tablets are compatible
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Our application is built on a Service-Oriented Architecture (SOA) framework, which is designed to support interaction and data exchange between disparate systems. This architecture enables our application to offer a highly flexible and extendible service interface through API-driven interfaces while facilitating interoperability.
- Accessibility standards
- None or don’t know
- Description of accessibility
- The users can access the services via a suitable and responsive web interface that adjusts to different screen sizes and devices, including smartphones, tablets, and desktops while customising the core UI layout isn’t possible, as it is standardised to maintain uniformity and ease of use across all platforms.
- Accessibility testing
- No
- API
- Yes
- What users can and can't do using the API
-
1. API Authentication: Users need to authenticate using their API key and token to interact securely with our APIs.
2. Create Requests: To set up a new service or resource in our application, users can make a POST request to the appropriate endpoint.
3. Documentation and Endpoints: Documentation available to customers on request providing available endpoints and required parameters for setting up different services.
4. Update Requests: Changes to existing resources can be made through PUT requests.
5. Batch Updates: For bulk changes, we may support batch requests to update multiple records at once, depending on the specific needs and the API's capabilities.
--Limitations--
1. Rate Limits: We impose rate limits to ensure fair usage and server stability. Exceeding these limits may result in temporary blocks.
2. Permission and Roles: Users must have the appropriate permissions and roles assigned to perform certain actions through the API.
3. Data Validation: The API enforces data validation rules. Any attempt to send invalid data (e.g., incorrect data types or missing required fields) will result in errors.
4. Complex Transactions: Some complex business processes may require multiple API calls or are not fully exposed via the API, necessitating alternative methods or manual intervention. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- We offer customizations to develop new functionalities and features based on the business requirements document shared with us by the client. The assessments for implementations are provided after detailed requirements are received and accepted. Such customizations are chargeable hourly at agreed rates as mentioned in the contract.
Scaling
- Independence of resources
-
1. Resource Isolation: Separating physical servers or employ virtualization technologies to isolate resources at the hardware or virtual machine level.
2. Load Balancing: Distributing incoming service requests evenly across multiple servers, preventing any single server from becoming a bottleneck.
3. Prioritization of Resources: Assign priority levels to different types of traffic and manage bandwidth allocation accordingly to ensure critical applications always have the necessary resources.
4. Rate Limiting: Implement rate limiting to control the amount of resources a single user or operation can consume, thus preventing overuse.
5. Performance Monitoring and Management
6. Redundancy and Failover Systems
7. Clear SLAs
Analytics
- Service usage metrics
- Yes
- Metrics types
-
1. Patient Metrics
- Patient Registrations.
- Patient Visits
- Patient Outcomes
2. Clinical Metrics
- Treatment Efficacy
- Disease Management
3. Operational Metrics
- Appointment Scheduling Efficiency
- Bed Occupancy Rates
- Inventory Turnover
4. Financial Metrics
- Revenue Generation
- Billing Accuracy
- Cost of Care
5. Quality and Compliance Metrics
- Compliance Rates
- Patient Satisfaction Scores
- Audit Results
6. Staff Performance Metrics
- Staff Utilization
- Professional Development
7. Technology and System Metrics
- System Uptime - Reporting types
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
1. Understanding the Data Requirements
2. Preparing for Export
3. Choosing the Export Method
4. Performing the Export
5. Post-Export Processing - Data export formats
-
- CSV
- Other
- Other data export formats
- MS Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
- MS Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
SLA of 99.9% is based on those AWS currently provides for the underpinning services. Due to the rapidly evolving nature of AWS’s product offerings, SLAs are best reviewed directly on our website via the links below:
• Amazon EC2 SLA: http://aws.amazon.com/ec2-sla/
• Amazon S3 SLA: http://aws.amazon.com/s3-sla
• Amazon CloudFront SLA: http://aws.amazon.com/cloudfront/sla/
• Amazon Route 53 SLA: http://aws.amazon.com/route53/sla/
• Amazon RDS SLA: http://aws.amazon.com/rds-sla/
• AWS Shield Advanced SLA: https://aws.amazon.com/shield/sla/
Well-architected solutions on AWS that leverage AWS Service SLA’s and unique AWS capabilities such as multiple Availability Zones, can ease the burden of achieving specific SLA requirements. - Approach to resilience
-
As a technology service provider hosting solutions on AWS, we maintain a robust Business Continuity Plan (BCP) to effectively manage potential outages. Our plan is structured around AWS's three-phase approach: Activation and Notification, Recovery, and Reconstitution. This methodical approach ensures efficient system recovery, minimizes downtime, and reduces the chance of errors during restoration.
AWS maintains a secure and consistent environment across all data centers, which are built to stringent physical, environmental, and security standards. Employing an active-active configuration with an n+1 redundancy model, each essential component has at least one backup, ensuring high system availability and resilience. All data centers are operational and ready to handle traffic; in the event of a failure, the system architecture supports immediate load-balancing to other active sites.
Our commitment extends to comprehensive contingency planning, ongoing training, and systematic testing of our managed solutions. We have implemented a thorough continuity strategy that includes regular backups of server instances, data redundancy via replication, and strategic data placement across multiple AWS Availability Zones. This ensures not only the continuity but also the security of our applications and services, providing our clients with reliability and peace of mind. - Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
The measures implemented to manage and restrict access can be divided into six sub-categories:
1) Physical Access Control
2) Logical Access Control 3) Access Administration
4) Authentication and Authorisation
5) Data Access Control
6) Data Transfer. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Indraprastha SystemCert Private Limited
- ISO/IEC 27001 accreditation date
- 06/05/2024
- What the ISO/IEC 27001 doesn’t cover
- The Registered Scope is as follows: Information Security Management systems applicable to tools & platforms for Healthcare, Animal Science, Citizen ID, Epigenetic, Information & Cyber Security, Net Zero, Climate Change Adaptation, Mitigation, Agriculture, Forestry, Renewables, Carbon Credits, Nature, Biodiversity & Social Impact Credits, Energy, Oil & Gas, Performance Management, Delivery Units, Monitoring & Evaluation, Reporting & Learning from above location.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We follow the following processes:
1. Policy Development: Clearly defined objectives for information security, based on risk assessments and business requirements. Regularly review and update these policies to adapt to new threats and changes in our business environments.
2. Human Resources Security: We conduct basic pre-employment checks and ongoing security and awareness training.
3. Access Control: Managed access rights based on the principle of least privilege, regularly reviewing and adjusting these rights as necessary.
4. Physical and Environmental Security: Maintaining secure physical access to information systems and protecting against environmental hazards.
5. Operations and Communications Security: Implemented measures to protect against malware, ensure secure network services, and manage secure data handling and transmissions.
6. Incident Management: Maintain an incident response plan, including mechanisms for reporting and analysing breaches.
Our Information Security Officer or Manager oversee the ISMS and report directly to top management. A dedicated security team or committee supports ongoing compliance and reporting.
We conduct regular internal and external audits to ensure adherence to policies. Regular reviews with top management assess the effectiveness of the ISMS. Violations of policies are met with clear, predefined consequences, enhancing compliance and accountability.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Conforms to ISO20000-1 & ISO27001
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Conforms to ISO27001
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Conforms to ISO27001
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Conforms to ISO20000-1 & ISO27001
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
1. Affordable Access: By facilitating remote consultations and digital health services, healthcare software can reduce the need for physical visits, which often involve travel and associated costs. This makes healthcare more accessible and affordable, particularly for low-income families.
2. Preventive Care: Health management platforms can offer preventive care advice and early warning signs for potential health issues. This proactive approach can prevent serious diseases that are more costly to treat, thereby reducing the financial burden on individuals.
3. Resource Allocation: Data-driven insights from such platforms can help healthcare providers identify areas with the most pressing needs, ensuring that limited resources are directed where they are most needed and potentially reducing healthcare disparities.Equal opportunity
1. Universal Accessibility: By making health resources available online, healthcare software ensures that anyone with internet access can reach them, regardless of geographical location or mobility limitations.
2. Personalization: Our recommendation algorithms can help tailor treatments and recommendations to individual needs, factoring in a wide range of personal health data. This ensures that everyone, regardless of their specific circumstances, receives the most effective care.
3. Language and Cultural Inclusivity: Multilingual support and culturally sensitive content can make healthcare more inclusive, catering to a diverse user base and ensuring that healthcare disparities are minimized.Wellbeing
Continuous Care and Monitoring: Continuous monitoring of health parameters allows for timely interventions, which can significantly improve the quality of life and prevent complications.
Pricing
- Price
- £22,487 to £37,979 a unit
- Discount for educational organisations
- No
- Free trial available
- No