Skip to main content

Help us improve the Digital Marketplace - send your feedback

Gaiasoft International Limited

Patient Centred Care

Integrated, comprehensive, customisable incorporating healthcare management, health records, telemedicine, real-time patient monitoring and personalized treatment plans. Efficient marketplace of labs and imaging providers. Enhances accessibility, improves diagnostic accuracy. Proactive population health through data analytics and learning and healthy family habits.

Features

  • Enables GP, hospital, leisure centre to collaborate for healthy families
  • Electronic Health Records (EHR), Telemedicine Services and Patient Monitoring
  • Personalized Treatment Plans, Appointment Scheduling
  • Configurable modules and open APIs for integration and extension
  • Multi-channel Communications remind, inform, nudge healthy choices
  • Enables multiple family and patient touch points. “Longevity Leap” synergy
  • Compliance and Security. “CitizenID” synergy for security and personalisation
  • Integrated billing systems and value for money purchasing
  • Configurable Mobile Health Applications
  • Patient Centred Care synergy with our veterinary service

Benefits

  • Enhances care coordination, healthcare access
  • Preventive health dividend by coordinating with services beyond NHS
  • Enables early health issue detection for timely intervention
  • Enhances treatment effectiveness
  • Empowers active patient participation and improves satisfaction
  • Provides insights for informed decision-making
  • Streamlines billing processes where applicable
  • Enhances patient ownership, empowered engagement, results and satisfaction
  • Ensures data protection and legal compliance
  • Offers convenience and constant health management access.

Pricing

£22,487 to £37,979 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at morel.fourman@gaiasoft.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 4 4 6 0 9 3 1 1 3 0 7 4 8 0

Contact

Gaiasoft International Limited Morel Fourman
Telephone: 02076924035
Email: morel.fourman@gaiasoft.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
The service is a SaaS service and can also be hosted on-premise on most Linux and Windows Operating Systems. Linux systems are preferred.
System requirements
Not applicable as its a SaaS platform

User support

Email or online ticketing support
Email or online ticketing
Support response times
We have a Service Level Agreement based ticketing support.

Priority 1 tickets are responded to within 4 hours
Priority 2 tickets are responded to within 6 hours
Priority 3 tickets are responded to within 8 hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
1 Chatbot & FAQ Access: Our web chat features an intelligent chatbot equipped with a comprehensive FAQ module. Users can query this system for instant information about navigating and utilizing the platform. However, the chatbot is limited to providing information available in its database and cannot offer personalized medical advice. We can provide support for WhatsApp for business as on-demand integration.
2. Human Assistance: If the query exceeds the chatbot’s capabilities or requires personal interaction, the chatbot is designed to triage and seamlessly escalate the issue by connecting the user to a human agent. This ensures that complex concerns are addressed with a personal touch.
3. Ticketing Option: For issues that require further investigation or are not immediately resolvable, users have the option to open a support ticket directly through the chatbot. This feature is intended for non-urgent queries and users will receive a follow-up response based on the order the tickets were received.
Web chat accessibility testing
NA
Onsite support
Yes, at extra cost
Support levels
We provide onsite training, installation, program build, program operate and program transfer support, if required
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We have multiple modes of training:
a) Onsite training in the form of "Train the Trainer" and provide them with adequate resources to train the rest of the staff.
b) Self Service through our Knowledge Base which has training videos on how to use the application.
c) Regular monthly training as a part of the monthly calendar to train new staff. (This is available on a chargeable basis.)
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
The data can be exported in Excel / CSV formats.
End-of-contract process
We extract the data by module and provide them in a CSV / Excel Format. If we have to provide the data in any other format, it would be chargeable on a time and material basis based on data size and the effort estimates as shared to do such extraction. The effort will be estimated, and signed off and then the extraction will proceed. The prices will be defined in the contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile, iPad and tablets are compatible
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Our application is built on a Service-Oriented Architecture (SOA) framework, which is designed to support interaction and data exchange between disparate systems. This architecture enables our application to offer a highly flexible and extendible service interface through API-driven interfaces while facilitating interoperability.
Accessibility standards
None or don’t know
Description of accessibility
The users can access the services via a suitable and responsive web interface that adjusts to different screen sizes and devices, including smartphones, tablets, and desktops while customising the core UI layout isn’t possible, as it is standardised to maintain uniformity and ease of use across all platforms.
Accessibility testing
No
API
Yes
What users can and can't do using the API
1. API Authentication: Users need to authenticate using their API key and token to interact securely with our APIs.
2. Create Requests: To set up a new service or resource in our application, users can make a POST request to the appropriate endpoint.
3. Documentation and Endpoints: Documentation available to customers on request providing available endpoints and required parameters for setting up different services.
4. Update Requests: Changes to existing resources can be made through PUT requests.
5. Batch Updates: For bulk changes, we may support batch requests to update multiple records at once, depending on the specific needs and the API's capabilities.
--Limitations--
1. Rate Limits: We impose rate limits to ensure fair usage and server stability. Exceeding these limits may result in temporary blocks.
2. Permission and Roles: Users must have the appropriate permissions and roles assigned to perform certain actions through the API.
3. Data Validation: The API enforces data validation rules. Any attempt to send invalid data (e.g., incorrect data types or missing required fields) will result in errors.
4. Complex Transactions: Some complex business processes may require multiple API calls or are not fully exposed via the API, necessitating alternative methods or manual intervention.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
We offer customizations to develop new functionalities and features based on the business requirements document shared with us by the client. The assessments for implementations are provided after detailed requirements are received and accepted. Such customizations are chargeable hourly at agreed rates as mentioned in the contract.

Scaling

Independence of resources
1. Resource Isolation: Separating physical servers or employ virtualization technologies to isolate resources at the hardware or virtual machine level.

2. Load Balancing: Distributing incoming service requests evenly across multiple servers, preventing any single server from becoming a bottleneck.

3. Prioritization of Resources: Assign priority levels to different types of traffic and manage bandwidth allocation accordingly to ensure critical applications always have the necessary resources.

4. Rate Limiting: Implement rate limiting to control the amount of resources a single user or operation can consume, thus preventing overuse.

5. Performance Monitoring and Management

6. Redundancy and Failover Systems

7. Clear SLAs

Analytics

Service usage metrics
Yes
Metrics types
1. Patient Metrics
- Patient Registrations.
- Patient Visits
- Patient Outcomes

2. Clinical Metrics
- Treatment Efficacy
- Disease Management

3. Operational Metrics
- Appointment Scheduling Efficiency
- Bed Occupancy Rates
- Inventory Turnover

4. Financial Metrics
- Revenue Generation
- Billing Accuracy
- Cost of Care

5. Quality and Compliance Metrics
- Compliance Rates
- Patient Satisfaction Scores
- Audit Results

6. Staff Performance Metrics
- Staff Utilization
- Professional Development

7. Technology and System Metrics
- System Uptime
Reporting types
Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
1. Understanding the Data Requirements
2. Preparing for Export
3. Choosing the Export Method
4. Performing the Export
5. Post-Export Processing
Data export formats
  • CSV
  • Other
Other data export formats
MS Excel
Data import formats
  • CSV
  • Other
Other data import formats
MS Excel

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
SLA of 99.9% is based on those AWS currently provides for the underpinning services. Due to the rapidly evolving nature of AWS’s product offerings, SLAs are best reviewed directly on our website via the links below:

• Amazon EC2 SLA: http://aws.amazon.com/ec2-sla/
• Amazon S3 SLA: http://aws.amazon.com/s3-sla
• Amazon CloudFront SLA: http://aws.amazon.com/cloudfront/sla/
• Amazon Route 53 SLA: http://aws.amazon.com/route53/sla/
• Amazon RDS SLA: http://aws.amazon.com/rds-sla/
• AWS Shield Advanced SLA: https://aws.amazon.com/shield/sla/

Well-architected solutions on AWS that leverage AWS Service SLA’s and unique AWS capabilities such as multiple Availability Zones, can ease the burden of achieving specific SLA requirements.
Approach to resilience
As a technology service provider hosting solutions on AWS, we maintain a robust Business Continuity Plan (BCP) to effectively manage potential outages. Our plan is structured around AWS's three-phase approach: Activation and Notification, Recovery, and Reconstitution. This methodical approach ensures efficient system recovery, minimizes downtime, and reduces the chance of errors during restoration.

AWS maintains a secure and consistent environment across all data centers, which are built to stringent physical, environmental, and security standards. Employing an active-active configuration with an n+1 redundancy model, each essential component has at least one backup, ensuring high system availability and resilience. All data centers are operational and ready to handle traffic; in the event of a failure, the system architecture supports immediate load-balancing to other active sites.

Our commitment extends to comprehensive contingency planning, ongoing training, and systematic testing of our managed solutions. We have implemented a thorough continuity strategy that includes regular backups of server instances, data redundancy via replication, and strategic data placement across multiple AWS Availability Zones. This ensures not only the continuity but also the security of our applications and services, providing our clients with reliability and peace of mind.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
The measures implemented to manage and restrict access can be divided into six sub-categories:
1) Physical Access Control
2) Logical Access Control 3) Access Administration
4) Authentication and Authorisation
5) Data Access Control
6) Data Transfer.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Indraprastha SystemCert Private Limited
ISO/IEC 27001 accreditation date
06/05/2024
What the ISO/IEC 27001 doesn’t cover
The Registered Scope is as follows: Information Security Management systems applicable to tools & platforms for Healthcare, Animal Science, Citizen ID, Epigenetic, Information & Cyber Security, Net Zero, Climate Change Adaptation, Mitigation, Agriculture, Forestry, Renewables, Carbon Credits, Nature, Biodiversity & Social Impact Credits, Energy, Oil & Gas, Performance Management, Delivery Units, Monitoring & Evaluation, Reporting & Learning from above location.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We follow the following processes:
1. Policy Development: Clearly defined objectives for information security, based on risk assessments and business requirements. Regularly review and update these policies to adapt to new threats and changes in our business environments.
2. Human Resources Security: We conduct basic pre-employment checks and ongoing security and awareness training.
3. Access Control: Managed access rights based on the principle of least privilege, regularly reviewing and adjusting these rights as necessary.
4. Physical and Environmental Security: Maintaining secure physical access to information systems and protecting against environmental hazards.
5. Operations and Communications Security: Implemented measures to protect against malware, ensure secure network services, and manage secure data handling and transmissions.
6. Incident Management: Maintain an incident response plan, including mechanisms for reporting and analysing breaches.

Our Information Security Officer or Manager oversee the ISMS and report directly to top management. A dedicated security team or committee supports ongoing compliance and reporting.

We conduct regular internal and external audits to ensure adherence to policies. Regular reviews with top management assess the effectiveness of the ISMS. Violations of policies are met with clear, predefined consequences, enhancing compliance and accountability.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Conforms to ISO20000-1 & ISO27001
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Conforms to ISO27001
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Conforms to ISO27001
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Conforms to ISO20000-1 & ISO27001

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Tackling economic inequality

1. Affordable Access: By facilitating remote consultations and digital health services, healthcare software can reduce the need for physical visits, which often involve travel and associated costs. This makes healthcare more accessible and affordable, particularly for low-income families.

2. Preventive Care: Health management platforms can offer preventive care advice and early warning signs for potential health issues. This proactive approach can prevent serious diseases that are more costly to treat, thereby reducing the financial burden on individuals.

3. Resource Allocation: Data-driven insights from such platforms can help healthcare providers identify areas with the most pressing needs, ensuring that limited resources are directed where they are most needed and potentially reducing healthcare disparities.

Equal opportunity

1. Universal Accessibility: By making health resources available online, healthcare software ensures that anyone with internet access can reach them, regardless of geographical location or mobility limitations.

2. Personalization: Our recommendation algorithms can help tailor treatments and recommendations to individual needs, factoring in a wide range of personal health data. This ensures that everyone, regardless of their specific circumstances, receives the most effective care.

3. Language and Cultural Inclusivity: Multilingual support and culturally sensitive content can make healthcare more inclusive, catering to a diverse user base and ensuring that healthcare disparities are minimized.

Wellbeing

Continuous Care and Monitoring: Continuous monitoring of health parameters allows for timely interventions, which can significantly improve the quality of life and prevent complications.

Pricing

Price
£22,487 to £37,979 a unit
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at morel.fourman@gaiasoft.com. Tell them what format you need. It will help if you say what assistive technology you use.