Theseus: Integrated Care System (ICS) Management
Theseus: Integrated Care System Management is a specialised solution for Integrated Care Boards (ICB). It facilitates Single Point of Access (SPoA) for patients to integrated referral ecosystems comprised of NHS and local authority health and care teams, plus services delivered by VCSE partners and external agencies.
Features
- Modules for two-way primary care system integration (EMIS, SystmOne, Vision)
- Supports online wellbeing referral networks with 100s of partners
- Enable partners to send or receive referrals, or both
- Customisable triage and caseload features for health and care interventions
- Integrated outcome reporting – understand the outcomes of referrals made
- Diary and Booking System Module facilitates appointment booking for services
- Service directory for patient self-exploration and self-referral
- Self-assessment feature empowers patients to identify their wellbeing challenges
- Data API Module supports Population Health Management reporting / analysis
- Training portal for easy onboarding of teams and partner agencies
Benefits
- Flexible, scalable platform; only pay for the modules you need
- Ideal, scalable solution for Integrated Care Boards (ICB)
- Facilitates integrated referral networks between NHS, councils and other agencies
- Provide patients with a Single Point of Access (SPoA)
- Manage Stop Smoking, weight management, physical activity, social prescribing services
- Statutory reporting features available, e.g. Stop Smoking Services Quarterly Returns
- Powerful health and care management reporting features and data dashboards
- Readily integrated with other systems using HL7 FHIR APIs
- Engagement Website and Client Portal modules to inspire patient self-management
- ISO 27001:2022 and Cyber Essentials Plus certified. DCB0129 compliant.
Pricing
£34,500 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 6 8 5 9 4 2 4 6 3 7 5 0 0 8
Contact
Cyber Media Solutions Ltd.
Tony Bonser
Telephone: 01785 222350
Email: enquiries@cyber-media.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- No
- System requirements
-
- Web browser
- Internet / data connection
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Target response times are summarised as follows. Critical Priority Issue: 2 hours; High Priority Issue: 4 hours; Medium Priority Issue: 1 day; Low Priority Issue: 2 days; Request for Enhancement: 14 days.
Support is available Monday - Friday, 9am - 5pm (excluding Bank Holidays). - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support is provided as standard as part of the annual Theseus product licence. We have a dedicated product support team that provides professional support to clients. The target response times, identified by our Theseus Service Level Agreement (SLA), are summarised as follows. Critical Priority Issue (system unavailable): 2 hours; High Priority Issue (partially unusable, significantly affecting operation): 4 hours; Medium Priority Issue (aspect causing difficulty): 1 day; Low Priority Issue (a general question): 2 days; Request for Enhancement: 14 days.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Our standard offer includes high quality online training materials, plus live webinar 'train the trainer' training to nominated Superusers.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Training portal / video media
- End-of-contract data extraction
-
Data may be extracted by the customer using Theseus Key Data Extracts.
We will provide a complete CSV extract of service data and arrange for secure transfer via an agreed secure method. - End-of-contract process
- We will provide a complete CSV extract of service data and arrange for secure transfer via an agreed secure method. If additional data migration or extraction services are required, these are available via our Rates Card.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- A Mobile Worker Module is available which provides a streamlined user interface for mobile working. The interface is fully responsive for ease of use on mobile and tablet devices and is optimised for efficient and accurate working away from traditional desk-based environments.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- FHIR APIs are available to link Theseus with other systems. Primary care system API integrations are available. A Theseus Data API Module is also available for integrating Theseus with business intelligence systems (e.g. Microsoft Power BI).
- API documentation
- Yes
- API documentation formats
-
- Other
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- A Flexible Forms Builder is available and Theseus has other customisable features to tailor the workflow in line with organisational and local requirements.
Scaling
- Independence of resources
- We use reliable and reputable suppliers. Environments are actively monitored and resources allocated to ensure service standards are maintained. Each deployment features a separate application instance to maximise resilience and security.
Analytics
- Service usage metrics
- Yes
- Metrics types
- A comprehensive range of service usage metrics can be provided by the product. For example, total number of service users, follow-ups completed, follow-ups outstanding, etc.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data may be extracted from Theseus in CSV format from: standard and bespoke reports, standard and bespoke dashboards, form extracts and system data extracts. Data may be exported as a CSV export of all form data submitted.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The in service availability has been, and is planned to be, better than 99.95%. We operate a transparent SLA. In all cases the times indicated are targets and we will make best endeavours to meet or exceed these targets.
- Approach to resilience
- Information and Business Continuity Plan available on request.
- Outage reporting
- System maintenance and upgrades are performed outside of business hours. Customers are informed of any planned service outage in advance via email. In the event of unplanned outage, customers will receive a report on the cause of the outage and its remediation.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Username or password
- Other
- Other user authentication
- IP restricted and time-sensitive access is also offered to customers.
- Access restrictions in management interfaces and support channels
-
The product features secure account management features that enable configuration of user permissions throughout the system to restrict access to management interfaces (and data) by role.
In line with our Information Security Management System, all support channel users must be pre-registered by authorised contacts in order to raise support tickets. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Username or password
- Other
- Description of management access authentication
- IP restricted and time-sensitive access is also offered to customers.
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 22/02/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- NHS England DSPT Standards met
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We operate an ISO 27001:2022 Information Security Management System supported by a comprehensive range of policies, procedures and processes, subject to ongoing review. Top level policies include (among others): Information Security Policy, Software Management Policy, Threat and Vulnerability Management Policy, Cloud Services Policy, Clinical Safety Policy.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We maintain detailed change logs for all our components and services.
Significant change must be assessed through compilation of a testing plan with clear acceptance criteria and security impact assessment. Clinical safety is also considered.
The individual responsible for testing must be identified and briefed regarding the testing they will need to undertake.
The asset owner obtains approval for the change, taking into account any technical considerations, the costs of the exercise, the potential benefits and security impact.
Once the change request is approved by the Team Manager, approval is recorded and logged. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our infrastructure is scanned using Nessus. All new software is risk assessed in line with our software management policy. Security patches are applied within 14 days of the update being made available by a vendor. To identify potential threats the NVD and CVE databases are regularly reviewed. Public-facing applications are subject to third party penetration tests.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We use a multilayer approach including firewalls and endpoint protection.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
We have an Information Security Incident Policy that defines our response.
All staff will be made aware through their contract of employment, training and by their team manager of what is considered to be an incident.
Information security weaknesses, events and incidents will be reported immediately by staff to the ISM as soon they are seen or experienced.
The ISM will be responsible for closing out the incident. This includes reports to external authorities.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- NHS Network (N3)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Cyber Media is committed to minimising adverse environmental impacts and a proactive approach to implementing measures with ongoing positive environmental benefits.
All our environmental commitments are measurable and demonstrable as we operate an ISO 14001:2015 certified Environmental Management System (‘EMS’).
Any non-conformities are logged, monitored and efficiently resolved.Covid-19 recovery
We recognise Covid-19 has significant ongoing impacts for physical as well as mental health. Theseus supports public health teams to efficiently deliver health and wellbeing interventions through professional case management.Tackling economic inequality
We appreciate the importance of understanding the causes and symptoms of health inequalities and Theseus’ robust episodic structure is optimised for accurate reporting and analysis. In addition to the powerful reporting tools within Theseus, a Theseus Data API is available should teams wish to conduct detailed analysis in a business intelligence system.Equal opportunity
As a company we are committed to equal opportunities within our recruitment process and professional development functions.Wellbeing
Theseus supports wellbeing agendas with caseload management and data collection and through enablement of joined-up, holistic service delivery. Theseus readily supports inter-agency referrals where a patient will benefit from multiple sequential or concurrent interventions, i.e. support for smoking cessation and for the establishment of a more active lifestyle.
Pricing
- Price
- £34,500 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No