DTAC Squirrel
The DTAC Squirrel™ Automated Compliance Platform will guide you through the entire NHS Digital Technology Assessment Criteria (DTAC) process. It will onboard you, create your base compliance artefacts, and assist you with your DTAC questions, educating you and ensuring that your healthtech product achieves DTAC compliance.
Features
- Automated completion of Digital Technology Assessment Criteria (DTAC) evidence
- Guidance to educate your team on all aspects of DTAC
- Real-time notifications to help you stay DTAC compliant
- AI assistance to guide you through the whole DTAC process
- Expert DTAC assurance support from our industry respected team
- Take care of NHS DSPT, Cyber Essentials and more
Benefits
- Achieve full DTAC compliance 10x faster
- Live chat support for all of your compliance questions
- Real-time notifications to help you stay DTAC compliant
Pricing
£370 to £970 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 9 5 4 7 7 2 3 2 2 6 4 7 2 1
Contact
Value Associates Ltd
Roxana Valea
Telephone: 02081444504
Email: info@valueassociates.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
- Works on all modern browsers
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 1 working day
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Accessibility audit against WCAG 2.1 AA with remediations applied.
- Onsite support
- No
- Support levels
- Singular support level: 9 AM to 5 PM Monday to Friday
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We offer:
1) Onboarding call
2) Bi-Weekly check ins
3) Video walkthroughs of key features - Service documentation
- No
- End-of-contract data extraction
- At end of contract, users can request their data and we will extract it in line with the contract and hand this over to the client.
- End-of-contract process
- At end of contract all data created by the system and client are handed over to the client. There is NO additional cost for this.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- The Service Interface can be enabled for NHS Trusts managing multiple DTAC projects.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Accessibility Audit against WCAG 2.1 AA with remediations applied.
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Elastic scaling cloud infrastructure.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- CSV, download
- Data export formats
-
- CSV
- Other
- Data import formats
-
- CSV
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.9%
- Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Role based permissions
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Data Centre is ISO 27001 compliant
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Data Centre is ISO 27001 compliant
- Information security policies and processes
- We follow a full stack of information security and data protection policies. We execute annual training on these policies and check employee understanding. We perform regular checks against the technical aspects of these policies, e.g. access control, to ensure the highest level of conformance.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All changes configuration and other change types are tracked through their lifetime via audit trails. Each system change is assessed for quality, privacy and security prior to being accepted and deployed.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We assess potential threats via a combination of vulnerability scanning and penetration testing. We use OWASP Top 10 and other authoritative threat reporting to ensure we stay appraised of the ever changing threat landscape.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We employ server-based protective monitoring to alert us to incoming threats and respond to all incidents within 8 hours. On identifying a security incident our approach is to evaluate, isolate, minimise any impact, then investigate and remediate the root cause.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Users can report incidents directly to us and we will keep clients appraised of incidents by email.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
Fighting climate change
At Value Associates Ltd we are committed to fighting climate change and support this through our home working policy and continuous efforts to reduce our carbon footprint through adoption of greener transport methods.Tackling economic inequality
Value Associates actively:
- Creates opportunities for entrepreneurship and help new, small organisations to grow, supporting economic growth and business creation.
- Creates employment opportunities particularly for those who face barriers to employment and/or who are located in deprived areas.
- Creates employment and training opportunities, particularly for people in industries with known skills shortages or in high growth sectors.Equal opportunity
Value Associates actively:
- Supports innovation and disruptive technologies throughout the supply chain to deliver lower cost and/or higher quality goods and services.
- Supports the development of scalable and future-proofed new methods to modernise delivery and increase productivity.
- Demonstrates collaboration throughout the supply chain, and a fair and responsible approach to working with supply chain partners in delivery of the contract.
- Demonstrates action to identify and manage cyber security risks in the delivery of the contract including in the supply chain.
Pricing
- Price
- £370 to £970 a unit
- Discount for educational organisations
- No
- Free trial available
- No