KOOTH DIGITAL HEALTH LIMITED

Qwell: Digital Mental Health Platform for Adults

Since 2001 Kooth Digital Health has been the UK’s leading provider to the NHS and Local Authorities in effective online mental health support. Providing Qwell, a safe, anonymous and welcoming space for adults to explore their mental health through a tailored clinical model and vibrant online community offering therapeutic choice.

Features

  • Provides safe, anonymous and immediate support, including out of hours
  • Available 24/7, 365 days a year
  • Web-based chat with BACP-accredited practitioners
  • Clinically moderated user and Qwell content, forums, activities and magazine
  • Local Engagement Leads driving regional up-take
  • Web-based platform for ease of access
  • Users self-refer and register
  • Instantly accessible from any web enabled, internet connected device

Benefits

  • Data-rich insights - regular reporting on population mental health
  • Live Text Chat - immediate access to BACP-accredited practitioners
  • Qwell Community - vibrant community of pre-moderated safe peer-to-peer forums
  • 24-hour Messaging - access asynchronous support
  • Activity-hub - supporting self-expression and healthy coping strategies
  • Robust Clinical Governance and Goal Based Outcomes
  • Pre-moderated content, 70% user-generated
  • A humanistic, integrative, ‘whole-person’ approach to online therapeutic support

Pricing

£56.00 to £63.00 a unit an hour

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@kooth.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

5 9 5 9 2 9 8 7 6 9 9 6 8 1 2

Contact

KOOTH DIGITAL HEALTH LIMITED Kooth Tenders
Telephone: 02039849337
Email: tenders@kooth.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
As our service is a web-based platform, service users need an internet-enabled device to access support.
System requirements
Service users need an internet-enabled device to access the platform.

User support

Email or online ticketing support
No
Phone support
No
Web chat support
No
Onsite support
No
Support levels
We provide one homogenous level of support for all customers. Our site and workforce are nationally accessible, differentiated only for the service user. The core site is the same. Any reported issues are dealt with by our in-house team of on-call engineers as soon as possible.
Support available to third parties
No

Onboarding and offboarding

Getting started
We provide materials and workshops, in person and virtually, to help users understand how to access and use the service
Service documentation
No
End-of-contract data extraction
Kooth plc has a privacy section service users can access when signing up to the service which details information relating to accessing records, clearly written for all service users. Where appropriate, practitioners can explain to service users that they have a right to see their files, to give further clarity and support with any access request or process, explaining about anonymity being compromised through this process due to having to evidence who they are. This right to see information is known as a Subject Access Request. Subject Access Requests should be made to Kooth plc’s data protection officer at DPO@kooth.com and service users should be informed about the consequences of submitting these requests, as they will be providing email addresses and other identifiable information, compromising their anonymity. Parents/carers do not have the automatic right to see records kept by Kooth plc. under the Educational Records Act 1989. Where adults are unable to exercise control over their records due to not having mental capacity to do so, applications for access can be made on their behalf by an Independent Mental Capacity Advocate (IMCA), appointed under the Mental Health Act, or next of kin where appropriate.
End-of-contract process
Off-boarding is a technically simple process for Qwell as a Commercial off-the-shelf (COTS) web-based platform. If a commissioning authority decides to decommission Qwell, the platform itself can simply be "turned off" for the region and the sign up flow adjusted to no longer contain the related locations and sub-locations for which Qwell was previously commissioned.
For service users, the process requires clinical and safeguarding governance. Initially the site will no longer accept new registrations for the specific locations while existing Service Users are slowly off-boarded to other local services that align with their specific needs. This is done in conjunction with commissioning authority to ensure service user safety. Service User data will also be deleted to ensure compliance with GDPR. This process is conducted in line with the guidelines set out in the NHS Data Security & Protection Toolkit on which Qwell is registered/assessed.
All is included in the price of the contract at no additional cost.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
N/A All functionality is retained on the mobile version of the platform.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Qwell's user interface allows service users to, among other things, join an impromptu or scheduled one-to-one chats with mental health professionals, participate in forums, read and write magazine articles, set goals. All the content users see is pre-moderated to avoid any trigger content.

The whole interface is based on HTML CSS and JavaScript user interface component. We've designed and built a fully WCAG 2.1 compliant library of re-usable User Interface components, leveraging the usability and accessibility research and patterns from the GDS Design System.
Accessibility standards
None or don’t know
Description of accessibility
We're committed to meeting the Web Content Accessibility Guidelines (WCAG) level AA with every page and feature built since January 2020.

There are still a small number of A-level and AA-level WCAG issues on Kooth. We have been working hard at training all team members to recognise and avoid accessibility issues.

Manual and automated accessibility tests are performed every day. An accessibility audit was conducted by a IAAP-certified Web Accessibility Specialist in May 2021, following the WCAG-EM process.

WCAG 2.1 is incomplete. So we're careful, in design, development and testing, to avoid many accessibility issues not covered by WCAG.
Accessibility testing
Over the past two years, most of our accessibility testing has been done directly by the team working on designing and building Kooth.

Our lead frontend engineer is a NVDA (screen reader) Certified Expert, IAAP-certified Web Accessibility Specialist and a keyboard (rather than mouse) user. We also hire an experienced accessibility specialist full time as a frontend developer.

They've trained most people on our product management, design and development team to test Kooth using screen readers, and accessibility features provided by Windows, macOS and web browsers.

As part of our day-to-day release process, new pages and features are tested with macOS VoiceOver, NVDA, and a range of assistive features (page zoom, keyboard accessibility, ..).

At least once a year, we also do a thorough audit of at least 50% of Qwell. At that time Qwell is checked in depth with more accessibility technologies (e.g. JAWS, VoiceControl) to avoid assistive technology support bugs.

Our lead frontend developer worked for a year as part of the W3C ARIA-AT Community Group, to help identify gaps in how well Assistive Technologies support the Accessible Rich Internet Application (ARIA) specification.
API
No
Customisation available
Yes
Description of customisation
Buyer specific landing pages can be provided

Scaling

Independence of resources
Due to the nature of our service, service users all use a single instance of the service.

We regularly perform load testing to ensure that we can handle volumes of traffic larger than historical peak usage.

Analytics

Service usage metrics
Yes
Metrics types
A broad range of service usage and journey metrics broken down by service type and user cohort
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
All Kooth Digital Health data is stored at rest within Google Cloud Platform (GCP). All disks are encrypted by GCP to protect against loss of disks. Data with higher security levels is stored with a further layer of encryption, using AES-256.
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users can export their data by making a subject access request through their account to a practitioner who will then escalate this via internal processes. This is done so users can maintain their anonymity, in contrast with direct email approach. Users can also email the Data Protection Officer at DPO@kooth.com with such a request, although in doing so will compromise their anonymity as a user.
Data export formats
Other
Data import formats
Other

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Kooth Digital Health does not commit to specific Service Level Agreements (SLAs) for our service. We do however use SLO (service level objectives.) Our SLO for the core service is 99.65% availability across a seven-day period. This is equivalent to a single five-minute outage per day. In practice our availability never falls below 99.95%. During core service hours we maintain higher levels of availability, in practice. Our response time for an alert is 10 minutes for a P1 during service hours and 30 minutes for a P1 during all other times.
We run our services as high availability which ensures that data and other resources are stored across at least two availability zones within the Google Cloud Platform region. Kooth data is hosted in the europe-west-2 region (London) of the Google Cloud Platform. Data hosted at this location is used for service delivery.
Approach to resilience
Kooth Digital Health's service compute infrastructure is run on Google Cloud Platform and provisioned across three availability zones. Each zone runs separate physical infrastructure and is resilient to other zones becoming unavailable. Kooth's data infrastructure is run on GCP (Cloud SQL) and configured to be high availability. Each database runs with an active master and a passive standby in different availability zones. Data is replicated at a disk level between the zones. In the event of the master failing (e.g. due to utility failure) the database would fail over to the stand-by zone and continue running. All services are run in Google Cloud data centres with redundant power supplies and back-up generators.
Outage reporting
Customers will be regularly informed of incidents and outages that have affected the system after the fact. As the system isn't directly utilised by the customer, this is not real time. Instead, the Regional Manager in charge of the contract will reach out to the commissioning authority to ensure they have complete transparency.
For planned outages Customer will receive two weeks notice in advance.

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
All Kooth staff and contractors must have sufficiently complex passwords. Access to email, documents and service infrastructure is controlled by Google Single Sign On and all staff are required to have enabled two-factor authentication. Source Code is stored in GitHub and engineering staff are required to have two factor authentication enabled. Staff are required to use a password manager for storing passwords and system credentials. System credentials are securely generated according to industry best practice. If access is required, a secure solution using Google Single Sign-On credentials is used.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have a standard set of policies and processes to maintain and review the security of our platform. We operate continuous automated outside-in penetration testing, two levels of firewalls inside our network, and automatically raise alerts for investigation when an attack is detected. We have a set of processes and policies for managing our systems. This includes defining clear owners, the sensitivity of the data managed, the processes to maintain the systems, and processes for periodically reviewing access using audit logs.

Ultimate responsibility for information security rests with the CFO, but on a day-to-day basis the CTO will be responsible for managing and implementing the policy and related procedures.
Line Managers are responsible for ensuring that their permanent and temporary employees, trainee and contractors are aware of: information security policies applicable in their work areas, their personal responsibilities concerning information security, and how to access information security advice.
All Users shall comply with information security procedures including the maintenance and management of Data confidentiality, Data integrity and Data erasure. Failure to comply with policies may result in disciplinary action being taken against one or more individuals.

All of this is encapsulated in DP-04 (A) Data Security & Information Governance Policy.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes are agreed and documented in Kooth's quality management system (QMS). References to changed code or configuration are tracked in there. Changes are programmatically applied to test environments managed by automated configuration management. Signed off changes are released to production environments and recorded via an automated process. All changes to production pass through technical quality reviews: code review, quality review, product sign-off and continuous external security review and monitoring. Engineers review OWASP principles as part of design and implementation activities.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We subscribe to notifications of vulnerabilities from all providers. Vulnerability notifications are assessed for impact and are patched by engineers or automatically via our public cloud provider, Google Cloud Platform, which hosts our data and service infrastructure. Most patches can be deployed within an hour. We engage an external provider to test our technical systems for vulnerabilities once per quarter as well as performing larger-scale ad-hoc security tests. We use monitoring to alert the engineering team to any attack taking place.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
In the event a breach should occur, we have a comprehensive data breach policy. We monitor the usage of our enterprise data storage for any potential accidental or malicious leaks of data. We have monitoring for compromises which alerts engineers. We monitor our service for common attacks and block them at the edge of our network. All actions on our infrastructure are logged for auditing purposes. Any employee has a responsibility to report suspected data breaches. An investigation will be started within 24 hours of a breach being discovered, following steps laid out in our data breach policy.
Incident management type
Supplier-defined controls
Incident management approach
During service hours, P1 incidents are acknowledged within 10 minutes. During all other hours, P1 incidents are acknowledged within 30 minutes. A P1 incident is defined as any incident preventing use by a significant number of practitioners or service users. We have comprehensive documentation for on call engineers on how to respond to alerts. Customers can report incidents to their customer contact but most incidents are caught by automated monitoring. Incident reports are routinely created and available on request. We notify customers of major impacts to their services or data after the fact.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Equal opportunity

Equal opportunity

Kooth provides a service that puts diversity and inclusion at its heart - ensuring that we remove barriers to great mental health services for all people regardless of race, age, gender, sexuality or socioeconomic background. We are aware that mental health affects different communities in different ways. Black and Non-White communities face barriers to mental healthcare in the form of language barriers, fear of stigma and a lack of cultural awareness. We are actively creating more content targeted towards minority communities through initiatives to increase usage from Black and Non-White backgrounds through partnerships with external organisations, such as BlackOut UK and Unity FM.
Wellbeing

Wellbeing

Kooth is a trusted and valued employer, with a rating of 4.3 /5 on Glassdoor and an expanding package of benefits for staff, which has been reviewed and enhanced during the past 12 months to support retention of staff, including a staff Health Care Plan, Long Term Incentive Plan (award of shares) and Life assurance. An extensive programme to support staff wellbeing and connection has also been put in place during the pandemic, including weekly events.

Pricing

Price
£56.00 to £63.00 a unit an hour
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@kooth.com. Tell them what format you need. It will help if you say what assistive technology you use.