Clarity - Digital Personal Health Budgets (PHB) App
Our PHB web App is designed to provide clinicians and admin teams with an easy to use application to speed up and provide transparency across the PHB process.
The PHB App includes a patient portal for individuals to review and truly collaborate on their health needs and budgetary spend.
Features
- Complete suite of assessment documents
- Harmonises processes throughout the ICS by using a streamline system
- Budget tool creates accurate estimated costs
- Supports complex individuals, equipment and Section 117
- Documentation repository for (CCG) ICS/ICB and Budget holder
- On screen help to assist with the PHB Process
- Role based access to ensure security of information
- Delivered across secure HSCN option
- Patient portal for true collaboration with the individual budget holder
- Online, digital signatures for consent
Benefits
- Supports NHS Personalisation Agenda
- Calculates Notional and Direct Payments including savings
- Budget Holder is central in their care and support plan
- Greater efficiency for the PHB process
- Reports number and type of PHB Budgets held
- All PHB's currently held can be input into the system
- Admin and Clinical support, training and mentorship available
- Intuitive, time saving and easy to use system
- Tested by experts in PHB Complex Care Nursing
- Built in reporting
Pricing
£0 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 7 4 1 3 5 7 6 4 2 2 4 4 5 6
Contact
Ethical Services Group
Steve Loveridge
Telephone: 07779498617
Email: steve@esg.limited
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
This PHB App deals with how the budget is spent following an approved CHC Assessment, in conjunction with the individual budget holder.
The CHC App and Booking module deals with the first stage of booking and carrying out CHC assessments.
Both PHB and CHC can be used standalone - Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- Needs MS Excel
- Needs Adobe PDF Reader
- Needs a browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Standard: 9 to 5 (UK time), Monday to Friday - response time 4 hours weekends 8 hours Alternative arrangements can be made to suit the client
However, training in CHC Assessments and good practice PHB will be provided as part of the on-boarding process. Additional support may be provided which will be costed according to requirements - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- We currently do not provide web chat. However, we are planning to provide this during 2022.
- Web chat accessibility testing
- None
- Onsite support
- Yes, at extra cost
- Support levels
- We provide a number of support services - these are customized to suit the client needs and budget. An account manager is assigned to all clients.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide a number of implementation, support, training and managed services. Implementation is straight forward and flexible. Provide access to training tutorials. We can host a bespoke training package at a fixed price. Account Manager liaison. Help desk support.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Decommissioning process - Data remains in the possession of customer.
- End-of-contract process
- Ongoing costs should the client require rolling non contractual software and services support
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
The entire product can be customized to meet client needs. During the initial engagement the spec will be discussed and changes documented and costed, however, the existing product meets all the needs other than some clients may require localised letters rather than those supplied.
APIs can be developed if required via our integration team.
Scaling
- Independence of resources
- We employ a robust change management process that validates change through a central governance function. Usage notifications Tamperproof audit Usage reporting
Analytics
- Service usage metrics
- Yes
- Metrics types
- As agreed with the customer
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Not applicable. Data is held at the client location
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- Client specified
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- Client specified
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- Other
- Other protection within supplier network
- We use HSCN
Availability and resilience
- Guaranteed availability
- 99.9%
- Approach to resilience
- Set up on HSCN with access only available by the client's IP address of which they have full control
- Outage reporting
- System Health Notifications
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Refer to service definition document
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
-
IASME Gold (working towards BS27001)
CREST - Information security policies and processes
- Refer to service definition document
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Refer to service definition document
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Refer to service definition document
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Refer to service definition document
- Incident management type
- Supplier-defined controls
- Incident management approach
- Refer to service definition document
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- NHS Network (N3)
- Health and Social Care Network (HSCN)
- Other
- Other public sector networks
- Organisation networks
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
ESG is committed to supporting the government's Net Zero target
Pricing
- Price
- £0 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Happy to discuss on an individual basis