VITALHUB UK LIMITED

Alamac: Business Intelligence and Reporting

Understanding the outputs of robust demand and capacity modelling are a fundamental requirement for the planning and delivery of effective and high-quality healthcare services. Leadership teams are able to use outputs from the analysis to proactively manage capacity constraints identified across systemwide and elective and urgent care pathways.

Features

  • Modelling tools for ED, Diagnostics, Community, Elective and Urgent pathways
  • Realtime system dashboard reporting calculated metrics for operational escalation management
  • Forecasting future demand and understanding resources required to meet it
  • Development of scenario models and options to mitigate against risks
  • Modelling impact of changing demand and capacity on performance indicators
  • Create objective understanding of demand and capacity through modelling tools
  • On-site operational consultancy to support delivery and performance improvement
  • Enables realtime ‘early warning’ of potential issues with near-term forecasts
  • Expert support through build, implementation and operationalisation of the tool
  • Completely customisable in terms of input and service structure

Benefits

  • Identifies recommendations to support service change
  • Improved, objective decision making around service changes
  • Development of more effective and focused approach to strategic planning
  • Informs strategic planning proposals for improved responsiveness and patient care
  • Proactive management of demand and capacity risks to service delivery
  • A system that can move towards being predictive not reactive
  • Enables clear identification of delivery risk through scenario planning
  • Support from highly skilled, professionally trained leaders and clinicians
  • Modelling tools which support operational delivery and performance assurance

Pricing

£7,950 an instance a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at colin.garrod@vitalhub.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

6 2 4 4 9 8 2 7 4 6 0 6 5 7 6

Contact

VITALHUB UK LIMITED Colin Garrod
Telephone: +44 (0)3339 874 587
Email: colin.garrod@vitalhub.com

Service scope

Software add-on or extension
No
Cloud deployment model
Hybrid cloud
Service constraints
Required datasets must be provided for modelling, reporting and analysis
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 24 hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
Each client will have an account manager assigned to discuss how to best use the service and embed within the organisation. A team of technical, analytical and operational personnel will be available for email and telephone queries. Operational personnel will be working on-site to provide bespoke support into the organisation

For technical support the following priority levels will be assigned:-
Priority 1 – 5 hours
Entire service is affected & tasks are impossible to complete
Request for password reset
• Priority 2 – 8 hours
Entire service is affected & tasks are more difficult but not impossible to complete
Request for new Kitbag account
• Priority 3 – 2 working days
10 or more users are affected & tasks are impossible to complete
• Priority 4 – 5 working days
1 user affected & tasks are impossible to complete
• Priority 5 – 10 working days
1 user affected & tasks are more difficult but not impossible to complete
Support available to third parties
No

Onboarding and offboarding

Getting started
Mobilisation:
We work with clients to confirm the objectives and expected outputs of the assignment. We will develop a plan of support that will be agreed by the client that will involve the following:-

Data collection:- We will issue a data request to meet the specification and outputs agreed. We will create a data sharing agreement and GDPR privacy statement with the client to ensure the correct Information governance arrangements are in place. we will then work directly with information teams to obtain the relevant historic data and agree the data feeds for future data collection. We will create kitbags for any data collection required from clinical teams that isn't currently available from organisational datasets.
Data validation:- we will load the data into the tool and work with local teams to ensure that the initial outputs "make sense"
Scenario testing:- we will work with local teams to identify appropriate levers and assumptions that would likely impact on future scenarios to include in the tool
Training:- Full training will be given to all clients with onsite, online and documentation options available
Supporting use of the tool:- Our operational team will support local teams to embed the tool into practice
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data will be provided as a CSV extract.
End-of-contract process
At the end of the contract a report will be completed for the client which will include a summary of the delivery provided, the tool and assumptions used in the creation of the scenarios and the outputs achieved.

Feedback will be requested from the client (at periods throughout and at the end of the contract) to determine the value that is being received from the tool and operational support provided.

The client user accounts will be closed and user account details will be deleted.

All data associated with the client (historical health and social care data) will be extracted and returned to the client. Alamac will delete all client data (health and social care data and user account details) to maintain IG standards.

All of the data extraction and data deletion at the end of the contract will be included in the price of the contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Fully mobile responsive data entry and online reporting options available.
Service interface
No
User support accessibility
WCAG 2.1 A
API
No
Customisation available
Yes
Description of customisation
All reporting and modelling is bespoke and customisable

Scaling

Independence of resources
Development of the application is optimised to minimise the burden on the server, with testing of any changes on a separate development environment.
The server is monitored to measure performance with alerts generated where there is significant pressure on resources. Those alerts are generated directly with the server support team initially and then subsequently with our platform management team. Immediate action will be taken to deal with performance issues where possible.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Via online reporting tool in multiple formats or on request as a CSV
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • Excel
  • Powerpoint
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
The online service is available 24/7 with and planned maintenance taking place out of business hours.
Approach to resilience
Available on request
Outage reporting
When service has a disruption or outage, we notify the users through emails.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces and support channels is restricted to named individuals who require authenticated access via a username and secure password
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
It is our policy to ensure that Information will be protected from a loss of:
-Confidentiality: so that information is accessible only to authorised individuals.
-Integrity: safeguarding the accuracy and completeness of information and processing methods.

The Chief Operating Officer and team review and make recommendations on the security policy, policy standards, procedures and security awareness education.

Regulatory, legislative and contractual requirements are incorporated into the Information Security Policy, processes and procedures.
Information security policies and processes
Policies and processes followed or used include: Information Security Policy, IT Policy and Disaster Recovery Policy. All documents pertaining to Information Governance and processes are available and accessible to all members of staff on the company intranet.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Processes are in place to ensure that all changes to the system are authorised, assessed for potential security impact and tested prior to being deployed.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The server is monitored through the our hosting partner's vulnerability scanning service.
Where a vulnerability is found, we will be emailed with details and a recommended course of action.
Any warnings are reviewed by the development team and actions taken to mitigate where necessary.
Any vulnerabilities 'Critical' and 'High' will be dealt with within 24 hrs of the alert.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our servers are monitored through 24-7 by the on-site server support teams and any problems are alerted in real-time. Potential compromises would be alerted by email and we would respond immediately to mitigate any threat.
Incident management type
Supplier-defined controls
Incident management approach
Users will contact our support desk by email or through the application to report any issues.

Issues will be logged in the issue management system and checked to see if issue has occurred previously.

Issues reported will be tested at multiple locations. This will confirm whether they are not they are local.

Action will be taken to correct confirmed issues immediately, liaising with the hosting partner as necessary.

Issue log will be updated and feedback to users will be provided by email or telephone

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Equal opportunity

Equal opportunity

Alamac have a corporate social responsibility to support charities and local initiatives. Each year our wider group selects two charities to support and help raise awareness and assist with fund raising activities as well as corporates service support in terms of marketing and business development help if required. We are renowned for working in partnership with the NHS and other private and public sector organisations and we are always working on proof of concept projects and sharing of new ideas.

We have a broader range of opportunities across the entirety of the business, and departments within it to offer apprenticeships. We have historically offered opportunities for work experience and apprenticeships across the UK, having affiliated links with universities and are dedicated in providing learning and development opportunities both to existing employees and potential new ones we hope to nurture and support.

In our wider group we run a number of user groups across our customer base throughout the year which offers informal learning and networking opportunities with other people from across the UK and also more widely with our international partners to understand health challenges, solutions and approaches to problem solving more further afield.

Pricing

Price
£7,950 an instance a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at colin.garrod@vitalhub.com. Tell them what format you need. It will help if you say what assistive technology you use.