Alamac: Business Intelligence and Reporting
Understanding the outputs of robust demand and capacity modelling are a fundamental requirement for the planning and delivery of effective and high-quality healthcare services. Leadership teams are able to use outputs from the analysis to proactively manage capacity constraints identified across systemwide and elective and urgent care pathways.
Features
- Modelling tools for ED, Diagnostics, Community, Elective and Urgent pathways
- Realtime system dashboard reporting calculated metrics for operational escalation management
- Forecasting future demand and understanding resources required to meet it
- Development of scenario models and options to mitigate against risks
- Modelling impact of changing demand and capacity on performance indicators
- Create objective understanding of demand and capacity through modelling tools
- On-site operational consultancy to support delivery and performance improvement
- Enables realtime ‘early warning’ of potential issues with near-term forecasts
- Expert support through build, implementation and operationalisation of the tool
- Completely customisable in terms of input and service structure
Benefits
- Identifies recommendations to support service change
- Improved, objective decision making around service changes
- Development of more effective and focused approach to strategic planning
- Informs strategic planning proposals for improved responsiveness and patient care
- Proactive management of demand and capacity risks to service delivery
- A system that can move towards being predictive not reactive
- Enables clear identification of delivery risk through scenario planning
- Support from highly skilled, professionally trained leaders and clinicians
- Modelling tools which support operational delivery and performance assurance
Pricing
£7,950 an instance a month
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 2 4 4 9 8 2 7 4 6 0 6 5 7 6
Contact
VITALHUB UK LIMITED
Colin Garrod
Telephone: +44 (0)3339 874 587
Email: colin.garrod@vitalhub.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
- Required datasets must be provided for modelling, reporting and analysis
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 24 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Each client will have an account manager assigned to discuss how to best use the service and embed within the organisation. A team of technical, analytical and operational personnel will be available for email and telephone queries. Operational personnel will be working on-site to provide bespoke support into the organisation
For technical support the following priority levels will be assigned:-
Priority 1 – 5 hours
Entire service is affected & tasks are impossible to complete
Request for password reset
• Priority 2 – 8 hours
Entire service is affected & tasks are more difficult but not impossible to complete
Request for new Kitbag account
• Priority 3 – 2 working days
10 or more users are affected & tasks are impossible to complete
• Priority 4 – 5 working days
1 user affected & tasks are impossible to complete
• Priority 5 – 10 working days
1 user affected & tasks are more difficult but not impossible to complete - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Mobilisation:
We work with clients to confirm the objectives and expected outputs of the assignment. We will develop a plan of support that will be agreed by the client that will involve the following:-
Data collection:- We will issue a data request to meet the specification and outputs agreed. We will create a data sharing agreement and GDPR privacy statement with the client to ensure the correct Information governance arrangements are in place. we will then work directly with information teams to obtain the relevant historic data and agree the data feeds for future data collection. We will create kitbags for any data collection required from clinical teams that isn't currently available from organisational datasets.
Data validation:- we will load the data into the tool and work with local teams to ensure that the initial outputs "make sense"
Scenario testing:- we will work with local teams to identify appropriate levers and assumptions that would likely impact on future scenarios to include in the tool
Training:- Full training will be given to all clients with onsite, online and documentation options available
Supporting use of the tool:- Our operational team will support local teams to embed the tool into practice - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data will be provided as a CSV extract.
- End-of-contract process
-
At the end of the contract a report will be completed for the client which will include a summary of the delivery provided, the tool and assumptions used in the creation of the scenarios and the outputs achieved.
Feedback will be requested from the client (at periods throughout and at the end of the contract) to determine the value that is being received from the tool and operational support provided.
The client user accounts will be closed and user account details will be deleted.
All data associated with the client (historical health and social care data) will be extracted and returned to the client. Alamac will delete all client data (health and social care data and user account details) to maintain IG standards.
All of the data extraction and data deletion at the end of the contract will be included in the price of the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Fully mobile responsive data entry and online reporting options available.
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- No
- Customisation available
- Yes
- Description of customisation
- All reporting and modelling is bespoke and customisable
Scaling
- Independence of resources
-
Development of the application is optimised to minimise the burden on the server, with testing of any changes on a separate development environment.
The server is monitored to measure performance with alerts generated where there is significant pressure on resources. Those alerts are generated directly with the server support team initially and then subsequently with our platform management team. Immediate action will be taken to deal with performance issues where possible.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via online reporting tool in multiple formats or on request as a CSV
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Excel
- Powerpoint
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- The online service is available 24/7 with and planned maintenance taking place out of business hours.
- Approach to resilience
- Available on request
- Outage reporting
- When service has a disruption or outage, we notify the users through emails.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access to management interfaces and support channels is restricted to named individuals who require authenticated access via a username and secure password
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
It is our policy to ensure that Information will be protected from a loss of:
-Confidentiality: so that information is accessible only to authorised individuals.
-Integrity: safeguarding the accuracy and completeness of information and processing methods.
The Chief Operating Officer and team review and make recommendations on the security policy, policy standards, procedures and security awareness education.
Regulatory, legislative and contractual requirements are incorporated into the Information Security Policy, processes and procedures. - Information security policies and processes
- Policies and processes followed or used include: Information Security Policy, IT Policy and Disaster Recovery Policy. All documents pertaining to Information Governance and processes are available and accessible to all members of staff on the company intranet.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Processes are in place to ensure that all changes to the system are authorised, assessed for potential security impact and tested prior to being deployed.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
The server is monitored through the our hosting partner's vulnerability scanning service.
Where a vulnerability is found, we will be emailed with details and a recommended course of action.
Any warnings are reviewed by the development team and actions taken to mitigate where necessary.
Any vulnerabilities 'Critical' and 'High' will be dealt with within 24 hrs of the alert. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our servers are monitored through 24-7 by the on-site server support teams and any problems are alerted in real-time. Potential compromises would be alerted by email and we would respond immediately to mitigate any threat.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Users will contact our support desk by email or through the application to report any issues.
Issues will be logged in the issue management system and checked to see if issue has occurred previously.
Issues reported will be tested at multiple locations. This will confirm whether they are not they are local.
Action will be taken to correct confirmed issues immediately, liaising with the hosting partner as necessary.
Issue log will be updated and feedback to users will be provided by email or telephone
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Equal opportunity
-
Equal opportunity
Alamac have a corporate social responsibility to support charities and local initiatives. Each year our wider group selects two charities to support and help raise awareness and assist with fund raising activities as well as corporates service support in terms of marketing and business development help if required. We are renowned for working in partnership with the NHS and other private and public sector organisations and we are always working on proof of concept projects and sharing of new ideas.
We have a broader range of opportunities across the entirety of the business, and departments within it to offer apprenticeships. We have historically offered opportunities for work experience and apprenticeships across the UK, having affiliated links with universities and are dedicated in providing learning and development opportunities both to existing employees and potential new ones we hope to nurture and support.
In our wider group we run a number of user groups across our customer base throughout the year which offers informal learning and networking opportunities with other people from across the UK and also more widely with our international partners to understand health challenges, solutions and approaches to problem solving more further afield.
Pricing
- Price
- £7,950 an instance a month
- Discount for educational organisations
- No
- Free trial available
- No