Skip to main content

Help us improve the Digital Marketplace - send your feedback

SIDQAM LTD

Direcht Virtual Wards

Direcht Wards offers a virtual ward system that helps reduce the need for hospital beds by allowing healthcare teams to monitor patients remotely. This system aims to improve patient care by providing a proactive and efficient approach that works both inside and outside of the hospital.

Features

  • Extensive remote monitoring with fully adjustable settings.
  • User-friendly dashboards, NEWS2 scoring, and smart notifications.
  • Virtual consultations and scheduling capabilities.
  • Numerous modifiable pathways for personalised care.
  • Standards-compliant across all requirements.
  • Remote device management enhances patient experience and adherence.

Benefits

  • Comprehensive support focuses clinicians on patient care.
  • Flexible software enables tailored clinician-led care pathways.”
  • Device neutrality offers enduring flexibility and adaptability.
  • Effortless integration circumvents data compartmentalisation.
  • Encourages active patient healthcare involvement.”
  • Lessens the necessity for domiciliary visits.
  • Enhances the health outcomes for patients.
  • Lowers staffing needs and costs
  • Boosts patient compliance and satisfaction significantly.
  • Enhances bed use, reduces admissions, hastens patient discharge process.

Pricing

£7 to £10 a licence a week

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at direcht@sidqam.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 6 1 2 7 3 8 2 5 0 8 4 8 1 3

Contact

SIDQAM LTD Business Development Unit
Telephone: 0161 818 4614
Email: direcht@sidqam.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
No service constraints
System requirements
  • Computer with an internet connections
  • Tablet with an internet connections

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Email to support@sidqam.co.uk
Support is provided in line with our support levels below.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
P 1 - Service unavailable for all users - Resolution time 6 working hours

P 2 - Individual Direcht service unavailable - Resolution time 8 working hours

P 3 - Core/Clinical module failure - Resolution time 24 working hours

P 4 – Non-core module failure - Resolution time 50 working hours

P 5 – New requirements or screen changes or UX issues- Resolution time potential future release if agreed by supplier-customer support group
Support available to third parties
No

Onboarding and offboarding

Getting started
We provide remote and on-site training and onboarding.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
The data stored from our systems is usually pushed back into existing EPR. If no system exists, a copy of new data collected will be stored on the server housed at the users location; the appointed admin user always has access and control of its data. If the appointed admin user chooses not to use the app, the data would remain accessible on the appointed admin user's server.
End-of-contract process
All data will be extracted from the system and provided to the appointed admin user in JSON/XML format. Once the trusts confirms safe receipt of data on their systems Sidqam Ltd will destroy all the data present on our servers and provide a written confirmation of the same. Data extraction in another format other than JSON/XML will incur an extra charge.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 A
Description of service interface
Direcht Wards is a user-friendly platform that enables at-home patient monitoring akin to hospital care. Patients can report health metrics, interact with clinicians, keep a health log, and access guidance. Healthcare professionals can oversee patient data, conduct video consultations, manage notifications, communicate via video and messaging with patient, conduct escalation pathway and view detailed analytics.
Accessibility standards
WCAG 2.1 A
Accessibility testing
Direcht Wards has been developed in collaboration with senior medical clinicians and been tested across a wide variety of demographics.
API
No
Customisation available
Yes
Description of customisation
Every aspect of Direcht Wards can be customised including:

User Roles
Access Levels
Patient Pathways
Wards
Patient Alert Thresholds
Escalations

Users with Admin Access are able to implement changes accordingly

Scaling

Independence of resources
Direcht Systems provide both vertical and horizontal scaling. The system has been designed to manage large volumes of patient transactions in an efficient manner. The use of ISO13606 as the underlying architecture provide the flexibility to scale and adopt.

Analytics

Service usage metrics
Yes
Metrics types
We provide a series of metrics based on data available. However the appointed user admin can define metrics they wish to view through the reporting tools included in the software.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach
Data is stored in a way that demographic data and clinical data are stored in different set of tables. They are only linked at run-time with the two factor authentication.
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The Direcht systems provide an out of box reporting tools accessible via its web version which can be exported to Microsoft Excel for further analysis. We work with trusts to help define data the requirement and the standards used for export. This is our data extraction services for customers wishing to analyse more complex criteria. We also provide a data analytics service with can be purchased separately.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • XML
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Application availability 98% with a threshold of 96%. Infrastructure downtime or other incidents within Force Majeur, planned or unplanned, is excluded from this calculation.
Approach to resilience
Available on request. Resilience provided by underlying hosting platform.
Outage reporting
E-mail alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
User Defined Access
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Sidqam Ltd is committed to ensuring security governance is given the highest level of importance. We have consultants who have worked in the security and information governance domain and are helping us to achieve the ISO/IEC 27001 certification.
Information security policies and processes
Our Information Security management System is used as a tool to assist us to identify and comply with business and legal/regulatory requirement and contractual security obligations. All Procedures are reviewed once a year to make sure they comply. All staff are required to comply with our information security guidelines.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our configuration and change management processes services are aligned to ITIL. All build and configuration assets are version controlled using source control. All changes are peer reviewed by at least two others and UAT performed before being merged into the base codebase.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We do in-house penetration testing. Any known vulnerabilities should be patched within 24 hours. In addition we have robust vulnerability management processes in place within Microsoft Azure to identify, triage, and mitigate vulnerabilities.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Realtime monitoring is in place to monitor potential compromises. Microsoft Azure communicates any data breach if it becomes aware of such. Escalation processes are in place once any compromise is identified. The degree of compromise will determine resource allocation and urgency of response. In most cases any compromise will be addressed immediately.
Incident management type
Supplier-defined controls
Incident management approach
Customers can phone or email with incidents. We use an incident management tool (Zoho) that has built-in reporting. In addition we also have procedures for - Conducting risk assessments for discovered security incidents. - Notify clients in the event a security incident occurs. - Revising our annual Security Risk Analysis and Risk Management Plan as necessary.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Fighting climate change

We strongly encourage our staff to prioritize consideration when traveling for work. Additionally, whenever feasible, we opt for remote client meetings. Our company policy emphasizes an 'online first' approach.

Pricing

Price
£7 to £10 a licence a week
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at direcht@sidqam.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.