openEHR
OpenEHR is a patient-centric, open standards, clinical data repository designed to maximise the re-use of a patients data across multiple applications.
It is highly configurable and offers a full service API to support a very wide range of clinical use cases including integrations with existing applications and systems.
Features
- Open standards clinical data repository
- Provides structure for the sharing of clinical data between systems
- Offers a full and comprehensive API and query language
- Easy to integrate with other clinical systems
- Intuitive user interface for desktop, tablet and mobile
- Different views on patient data for carers with different roles
- Highly configurable to a clients needs
Benefits
- Removes the need for duplicated clinical data
- No more paper or spreadsheets
- Get the data you need when you need it
- Dashboards give an instant overview of patient
- Easily export data to data analytics tools
Pricing
£5,000 to £200,000 an instance a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 1 9 8 8 8 3 3 5 7 1 7 4 2 0
Contact
STAIRCASE13 LIMITED
Steve Wilkinson
Telephone: 01612830961
Email: gcloud@staircase13.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No constraints.
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times will depend on the support contract and also on ticket priority as set by our customer. 1 hour response time is available.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We provide 2nd and 3rd line support 9am-5pm weekdays exc. bank holidays primarily via an online ticketing service. We offer telephone support at additional cost. Support costs vary depending on scale and level of service required. We follow ITIL Service Management processes and our service manager reports monthly to clients on support metrics.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Flexible training services are available including on-site training, train the trainer and video content.
The API is fully documented.
Additional onboarding services can be provided against the standard rate card. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Available via spreadsheet or database export.
- End-of-contract process
- Data is available at no cost upon request via either spreadsheet or database export. Other migration and data processing services are available against the standard rate card.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Interfaces are optimised for use with small screens with touch capabilities.
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- Yes
- What users can and can't do using the API
- All OpenEHR functionality is available via the API.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Fully customisable to a wide range of clinical specialities and requirements via web or native user interfaces, middleware and integration layers.
Scaling
- Independence of resources
- Servers are load balanced and appropriately sized for future expansion. Dedicated server resources are provided on a per client basis.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Determined by the customers requirements and includes audit logs, live dashboards, API and many other options.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- A wide range of options for exporting data are available depending on the client use case. This includes spreadsheet export, database export and integration with tools such as ElasticStack to enable the creation of data visualisations, statistical analysis and input into AI tools.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Database export
- ElasticStack export
- Export into alternative big data/analytics tool of clients choice
- Data import formats
-
- CSV
- Other
- Other data import formats
- Any format via the use of custom modules
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- As per agreed SLAs.
- Approach to resilience
- Using a UK-based hosting service provider with multiple physical locations, architected with hot standby services and automated failover between locations. Encrypted data at rest as standard.
- Outage reporting
- Direct phone call to clients for high priority outages. Email alerts for planned maintenance. Details included in monthly service reports.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- The application has role based restrictions which are managed either internally or delegated to an external authentication provider such as ActiveDirectory when required.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
-
We run a quarterly security audit of our products and systems to mitigate potential security issues.
We monitor for higher priority security issues and typically deal with critical issues within 2 weeks.
Employees are expected to follow the security policies and processes defined on our intranet.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
We have a comprehensive configuration management process comprising the branching, merging and reviewing of code changes with both manual unit testing and automated unit testing via a continuous integration environment.
All changes are managed and approved by the project steering committee and assessed for quality, security and clinical safety by trained experts. We provide a risk register with each release. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We have integrated software tools that monitor software components for vulnerabilities as code is built. Server stack software is upgraded regularly as part of our support and maintenance services. Urgent patches are typically deployed within 2 weeks while non-urgent security considerations are looked at as part of our quarterly security review. We receive information regarding threats from component vendors and by monitoring internet security bulletins.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We use intrusion detection tools that give live alerts. We typically respond to these incidents within a matter of hours.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
We utilise an ITIL compliant helpdesk to manage incidents through which users can raise issues. We have pre-defined processes for managing and resolving Helpdesk issues including customer communication and escalation.
A monthly service report is provided and reviewed along with a representative of the customer.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
openEHR is an enabler technology, a clinical data repository that makes electronic health records easily shareable between multiple software applications. This improves care for patients in a number of ways. For example, it makes it easier for data sharing between different NHS organisations so that awareness of patient allergies and medications is raised.
Pricing
- Price
- £5,000 to £200,000 an instance a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A free trial is available upon request using test patient data.