ClearView
ClearView is a clinical administration system that provides coding, morbidity and mortality management, form-based data collection, and domain specific analysis in a multi-disciplinary setting.
Embedding ICD, OPCS, SNOMED, HRG and tariff resources the system is able to provide measures for data quality and financial performance for hospitals.
Features
- A fully secure and collaborative environment for sharing information
- Real time data collection and analysis
- Targeted clinically-relevant patient data capture
- Systematic collaborative patient review
- Benchmarking against selected peer organisations
- Clinician-based comorbidity identification
Benefits
- Track the effect of policy changes
- Identify hidden anomalies in activity
- Provide a framework for managing internal audits and reviews
- Understand seasonal variances in healthcare
- Accurately record patient clinical details electronically
- Ensure accurate reimbursement for patient care
Pricing
£5,000 to £49,600 a licence
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 5 0 8 4 5 3 1 8 5 3 2 8 8 8
Contact
Woodward Associates
Mark Light
Telephone: 01753 867220
Email: mark.light@woodwardassoc.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- None
- System requirements
- Azure Site-to-Site VPN compliant router desirable but not a requirement
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We respond within 24 hours during normal working hours (0900-1700 Monday to Friday excluding public holidays)
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Please see Appendix A of the SLA
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We can provide onsite training, online training, and provide interface and managers documentation
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- No data is retained by this service
- End-of-contract process
- Access to the service is removed, nothing else is necessary due to the lack of data retention.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The same service is used for both mobile and desktop clients - it is reactive, so on smaller displays menu options usually visible will need to be displayed by clicking on an appropriate icon.
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Response metrics and system health statistics are monitored - additional resources can be committed when required.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Individual Response Time, Average Response Time, Failed Requests Counts, Average Failed Requests
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Only derived results are returned by the service
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- HL7
- Data import formats
-
- CSV
- Other
- Other data import formats
- HL7
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Please see SLA
- Approach to resilience
- Scalability, backup, disaster recovery and resilience plan is in place and available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Client managed access control with superuser status granted to specific personnel.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- The British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 12/04/2023
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- NHS Data Security and Protection Toolkit
- Information security policies and processes
-
Process and Security policies are maintained of the Company's intranet.
Company personnel and reporting structure is also documented and maintained on the Company's intranet with specific emphasis on the security reporting pathway.
Personnel are made aware of these policies and are required to read and acknowledge them.
Regular (annual) retraining is run on specific components of these policies that relate to the handling, retention and protection of client or other sensitive data.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Components are tracked through industry standard (Microsoft) source code control mechanisms, test suites and release management systems (e.g. Azure).
A Security Impact Analysis (SIA) is conducted by our Security Manager prior to major releases where access control mechanisms require changes. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
- We monitor recommendations from Azure Security Advisor, and respond to threats by updating system and infrastructure accordingly. Reviews are carried out on a systematic basis, and identified changes will be actioned in accordance with the SLA.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Audit access logs (including W3C service logging, and our own authorised access logs) includes the following capabilities for monotoring and responding to incidents:
Accurate Time Stamps
Recording on Session Activity by User and Workstation
Report on Backup, Test and Recovery operations
Alerting Critical Events
Audit System Status monitoring
Production of Sanitised and Statistical Management Reports
The Service Desk has real time access to logs and alerts
Incident responses are covered in the SLA - Incident management type
- Supplier-defined controls
- Incident management approach
-
We comply with the ISO-27001 information security standard, covering the scope of the service delivered.
The Statement of Applicability for our ISO controls is available under NDA.
Configuration, change management, incident response and protective monitoring are all demonstrated in our compliance with the ISO-27001 information security standard.
In addition to our ISO-27001 compliance, and our use of independent 3rd party penetration tests, we operate an assumed breach model and use active red-team penetration testing and vulnerability management as part of our Operational Security Assurance (OSA).
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- NHS Network (N3)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Covid-19 recovery
- Tackling economic inequality
- Wellbeing
Covid-19 recovery
Our products are used to ensure that patient data is fully and accurately coded, either at the initial point of clinical coding or subsequently during review or audit stages.
For an accurate understanding of the short and long-term effects of COVID-19, it is imperative that patient data is fully coded so that local, national, and international research and analysis provides a full picture.
Woodward Associates are confident that their software provides the facilities that are needed to ensure that this happens.Tackling economic inequality
Our products underpin the NHS Payment Scheme, whether they are the grouping technology which is the same as used in the Secondary Uses Service to assign HRGs, or whether it is the coding and auditing products which ensure that coding is exhaustive and accurate.
Any deficiencies in the clinical coding can result in a less complex HRG and possibly a lower tariff being assigned to patient activity, leading to underfunding for a healthcare provider.
Woodward Associates provide proven products that ensure that finances based on patient care are correct.Wellbeing
It is important for the long-term health and wellbeing of the population that an accurate and complete medical history is recorded.
Our products ensure that clinical coding for patient records are accurate, both at the initial point of coding, as well as subsequently during clinical reviews and audit.
From a user perspective, our software is developed to be as intuitive and efficient to use as possible - making their working experience as pleasant as possible.
Pricing
- Price
- £5,000 to £49,600 a licence
- Discount for educational organisations
- No
- Free trial available
- No