CLEARnotes
CLEARnotes is a clinically-designed patient consultation summary tool. The productivity tool converts clinician-patient conversations into clinical notes automatically - leveraging AI and speech recognition technologies to produce clear structured summaries which are ready to review and edit once the consultation is finished.
Features
- Automatically generated structured clinical summaries
- Option to produce other essential documents including referral/patient letters
- Ability to review and edit notes if required
- Easy to use platform
- Secure and compliant to NHS standards
- Customisable format
- Fully responsive to review on mobile and tablet devices
- Best practice user guide
Benefits
- More time to spend with patients
- Potential to enhance productivity by 20 to 80%
- Potential to reduce paperwork by up to 75%
- Increase capacity with the potential to reduce waiting lists
- Reduced clinical variation and increased standardised practice
- More detail captured in medical records
- Less reliance on external dictation services
- Improved documentation – quality and consistency across the team
- Reduced unnecessary cognitive load
- Improved job satisfaction, reducing burnout and increasing staff retention
Pricing
£8,000.00 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 7 3 9 3 6 1 4 0 9 8 8 5 7 6
Contact
33N LTD
John Jeans
Telephone: 07946080353
Email: john@33n.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- There is currently no integration with electronic patient records (EPR). It has been designed for face-to-face consultations in English.
- System requirements
-
- Stable broadband connection
- Up-to-date compatible web browser
- Up-to-date operating system (Windows or MacOS)
- Microphone
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times to support request received during business hours (Mon-Fri 09:00-17:00, except public holidays) are 2 hours. Support requests submitted at weekend or outside of business hours will receive a response within 2 hours of business hours of business hours recommencing.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Every client has the equivalent of five days of customer service included within their contract (total of 35 hours) - for each department where CLEARnotes is rolled out. This provides assistance with the initial set up, configuration, customisation and training as well as virtual meetings and on-site visits. A suite of online training materials is provided comprising a best practice user guide, step-by-step video tutorials and FAQs.
A customer service desk is available for troubleshooting Monday to Friday, 09:00-17:00 with problems submitted by email, response times are within 2 hours.
Additional support can be purchased at £1,250 per day (7 hours), if required.
Development requests can be submitted through the dedicated account manager. All users will be informed as updates are released. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
All customers are assigned a dedicated account manager who will support them to identify the clinical areas where they would like to implement CLEARnotes, and the number of clinics they would like to deploy the tool (pricing based on the number of clinics, see our pricing guide for the details).
They will then be introduced to the CLEARnotes customer service team, where clinicians with expertise in increasing productivity will provide advice.
To customise CLEARnotes according to each service’s needs, the team will co-design the tool with the client to ensure it is aligned to the organisation’s and department’s workflows and EPR system structure. The configuration can be completed virtually or on-site.
The team will collect names and email addresses of all those who will be using the tool, so that accounts can be created. The first users within a service or clinical area will be trained which will be accompanied with a suite of online training materials for future reference.
Microphones are required, these will be tested to ensure that high quality audio is being captured. No installation onto customer systems is needed. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- If data extraction is requested, client data will be provide in a CSV format and securely transferred.
- End-of-contract process
-
Contracts will be automatically renewed at the end of the initial 12-month term for successive periods of 12 months. Either 33n or the customer can terminate the contract with 30 days’ notice, on the date six months after the start of the engagement date or at each three-month interval thereafter.
On termination of the contract, all licences granted under the contract will be immediately terminated and 33n will destroy all customer data, unless requested otherwise by the customer.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Limited functionality
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
-
CLEARnotes can be customised to meet both service and organisational needs. Each client will work with their account manager to ensure CLEARnotes is aligned to their organisation’s workflows and EPR systems.
Within different departments or clinical areas, the tool is also tailored to ensure the terminology and desired information is captured and structured appropriately post consultation. This accounts for variations in both clinical summaries and patient letters as well as enabling a seamless switch to the productivity tool.
Scaling
- Independence of resources
- The service runs behind a load balancer and additional resources are automatically deployed within the architecture to overcome stresses on bandwidth and processing.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Audit of user logins and services accessed and an audit of data uploads
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data cannot be exported directly. A request will need to be logged with 33n, upon which any customer data can be batched and sent to a service of the customer’s choosing.
- Data export formats
- ODF
- Data import formats
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The CLEARnotes technical team will ensure, as far as reasonably practicable, that outages are resolved within 24 hours of becoming aware of the issue. Scheduled downtime will take place outside of normal business hours with a 99% uptime, subject to scheduled downtime.
- Approach to resilience
- Servers are loaded balanced where required. Automatic replacement of unhealthy servers without loss of service. Additional information is available on request.
- Outage reporting
- Clients impacted by service outages will receive notifications via email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Management interfaces are restricted to the role based access by specific usernames, support channels are restricted to authenticated users.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- The NSH Digital Toolkit assessment is used to help inform our approach to security governance. Security governance is overseen by named personnel in-house with the support of the relevant expert third party specialists to ensure compliance with statutory legislation and other regulation. and that systems and infrastructure are configured to provide the safest environment possible.
- Information security policies and processes
-
The following are the principle policies and procedures used to control information security: Information governance policy; Information Sharing and Processing policy; Information Risk policy; Confidentiality policy; Consent policy; Data Protection and Information Security policy; Cloud Vulnerability and Patch Management policy.
All staff members receive training on information governance and data protection as part of employee onboarding and complete annual refresher training. Compliance is audited regularly by the DPO. Named personnel are identified to all employees as the key stakeholders in all data security policies and processes, including points of contact for any subject access request or potential or detected security breach. Relevant registers are maintained and regularly audited by information governance personnel to ensure compliance with company policy and statutory obligations. A nominated member of the board is available to lead governance and security personnel to ensure data security is directed and monitored at board level.
Additionally, 33n follow the AWS’s shared responsibility model which includes ISO/IEC 27001:2013 and the Amazon Web Services - Well architected framework - Security Pillar.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- 33n cloud infrastructure is fully captured in the code and stored in versioned source control. Once the infrastructure has been deployed to AWS using Terraform. 33n uses AWS Config service to validate that all AWS resources are configured to specification. AWS config will continuously monitor all provisioned resources and will alert on any resources that have been modified outside the Terraform. These changes will be submitted to our protective monitoring and alerted to the operational team.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- All EC2 instances are based on 33n's prefabricated Amazon Machine Images (AMI) which are built using AWS CodeBuild and CIS open source hardening scripts and inspected by AWS Inspectors for vulnerability scanning. Upon scan completion of the AMI a report is produced by AWS inspector which is submitted and stored in SE for safe keeping. The AMI is either approved or rejected. All critical security patches are implemented within five days.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- 33n track, monitor and analyse all EC2 instances logs on the metrics as well as logs produced from AWS CloudTrail and AWS GuardDuty. All the logs and metrics are sent to the encrypted AWS Elasticsearch cluster, where the data is stored and processed and alerted upon in the event of performance or security issues. All alerts are triggered by the AWS SNS service. All captured logs and metrics are displayed to the operational team using AWS Elasticsearch - Kibana dashboards and protected with a VPN connection, providing secure access to the dashboards. Response to critical incidents is 24-hours from detection.
- Incident management type
- Supplier-defined controls
- Incident management approach
- 33n tracks, monitor, analyse, and audit events through the use of AWS CloudTrail. CloudWatch, AWS Config, AWS Config Rules and GuardDuty. 33n uses behavioural-based rules for identifying and detecting breaches or spills with instant notifications about offending user accounts and systems. 33n regularly opens support tickets with AWS Support for cross-validation. In the event of a detection, 33n have SDKs for quick containment using pre-defined restrictive security groups. Once the host or instance is isolated, 33n determine and analyse the correlation, threat and timeline. The host or instance along with any associated volumes and keys are then destroyed
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Covid-19 recovery
- Wellbeing
Covid-19 recovery
CLEARnotes enhances the speed and efficiency of clinical consultations with the potential to increase productivity by between 20-80%, thereby increasing capacity and the potential to reduce waiting lists.Wellbeing
The tool enables clinicians to spend more time with patients and reducing unnecessary cognitive load for clinicians and burnout, improving job satisfaction and increasing staff retention.
Pricing
- Price
- £8,000.00 a unit
- Discount for educational organisations
- No
- Free trial available
- No