Skip to main content

Help us improve the Digital Marketplace - send your feedback

IESE INNOVATION LTD

CareCubed

Next generation digital care pricing. CareCubed is a secure online tool to support open transparent negotiation of costs for specialist care placements. Provides structured, person-centred, approach recording needs and provides a clear baseline of costs for negotiation between commissioner and provider, & a mechanism for evaluating the impact of changes

Features

  • residential and supported living/semi-independent living placements.
  • Secure web-based tool accessed via browser, no installation required
  • Manage out-of-area placements benchmark data England, Scotland, Wales
  • Full range placements - Children, Working Age Adults, Older Persons
  • Templates capture current information & used for future
  • Established cost building blocks in line with the Care Act
  • Reports, dashboards provide intelligence covering financial, commissioning, market information
  • Collaboration functions across health, social care and provider organisations
  • Person-centred recording of needs
  • Robust methodology based on 16 years’ experience, wide sector uptake

Benefits

  • Transparency and evidence to inform negotiation and decision making
  • Clear assessment of impact of changes in costs or needs
  • Governance and cost control
  • Fair pricing for providers and commissioners
  • Forward planning based on robust evidence and data
  • Smoother collaboration and improved relationships between stakeholder groups
  • Consistency of approach across stakeholder groups
  • Shaping vibrant local markets and ensuring sustainability
  • Evidence that costs of delivering care have been fairly considered

Pricing

£13,000 to £27,000 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at craig.white@iese.org.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 7 9 7 2 8 3 1 9 3 5 3 9 1 9

Contact

IESE INNOVATION LTD Craig White
Telephone: 07990586679
Email: craig.white@iese.org.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
1) currently covers data across England, Scotland and Wales
2) requires use of a browser which supports secure SSL protocols
System requirements
Browser that supports the most secure SSL protocols

User support

Email or online ticketing support
Email or online ticketing
Support response times
For questions (rather than reports of system issues) we aim to reply within a business day. Depending on the nature of the query this may be a holding reply.
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Level 0: CareCubed has a very significant level of self-service support with online/context sensitive help and uses the WalkMe online virtual assistant to provide assistance appropriate to the user's level of confidence with CareCubed.
Level 1: and above via support desk which is staffed during usual business hours (9-5, Mon-Fri excluding bank holidays), level 2 and above to technical/subject matter experts via escalation from support desk.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
All new customers benefit from "getting started" instructions, online help, checklists, and introductory training videos (self-service). For many this is absolutely sufficient for their needs. Varying levels of implementtaion support are also available, including wrap-around consultancy about engaging with care providers/commissioner, negotiation, embedding CareCubed in work processes.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Videos
End-of-contract data extraction
Primary users may download a full data export of their organisation's CareCubed data at any time. This is initiated by the user, with output as a CSV file.
End-of-contract process
In advance of the contract end, the main business contact and/or primary users are advised of the end date and prompted to download any dat they wish to retain, and to delete any cases from CareCubed if they wish to. On the contract expiry date, the iESE system administrators then switch off access to CareCubed for the exiting organisation.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
There is no difference; the applications are responsive web apps so will fold down gracefully for mobile
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
There is an administrative control area which allows iESE to edit functions, see data, adjust settings and text.
We use a combination of WAVE and SiteImprove to regularly test the application, ensuring all aspects of accessibility (colour contrast, labelling, section ordering making sense to screen reading technology etc) remain at AAA standard.
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
One of iESE's Local Authority clients has tested the service with JAWS
API
No
Customisation available
No

Scaling

Independence of resources
IESE have their own pair of servers, and our private network is connected to ioMart's main backbone - so there is sufficient server resource and bandwitdh available to mitigate the impact of high service demand. We do not cap specific customers' network speed, but our Firewall does allow this if necessary.

Analytics

Service usage metrics
Yes
Metrics types
Realtime dashboards are available to customers on system usage in terms of no. of users, last log on dates for users, no. of cases created, cases shared with partners, cases with/without key data items (to drive improved use of system).
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Primary users may download a full data export of their organisation's CareCubed data at any time. This is initiated by the user, with output as a CSV file.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.8% uptime
Approach to resilience
We use VMWare with both Veeam and Altaro to continually replicate virtual machines to another datacentre and to thco HQ (for data at rest) to provide a number of potential points of recovery. In the event of a disaster, the backup VMs can be brought online quickly.
Outage reporting
We use UptimeRobot to continually monitor the service from an https perspective, which tells us of any issues within 60 seconds of them occuring. Our Cisco Firewall will also give us alerts of any downtime or intrusion.

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Access is provided using the principle of least privilege (PoLP), where it is limited to the smallest number of users possible with only the access they need to complete the tasks required, and is revoked once access is no longer needed. This applies at all levels for system support, management, and development.
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Our information security policy (ISP) maintains a security governance framework for iESE products and services to ensure operational security & all consumer data is protected
The ISP includes guidance for the Team and subcontractors. outlines responsibilities and empowers staff, it ensures that partners and suppliers support IESE security objectives
Cyber security and the ISP are standard agenda items on Team meetings which enables training & constant re enforcement– making it real for the team to understand and practically deal with issues if they arise.
Responsibility for the production, maintenance, and communication of the ISP lies with the iESE Executive.
Information security policies and processes
The iESE information security Policy provides a framework for the management of information security throughout IESE, responsibility for the production, maintenance and communication of this Information Security Policy lies with the iESE Executive..
Training is undertaken as part of employee induction. Home & mobile working policy sets out Info security standards and these are audited yearly by external IT company. All staff prompted to refresh training and required to undertake an online test at least annually. The team are regularly briefed on the practical behaviours needed to enforce the policy and risks & issues are discussed at appropriate project & team meetings
The ISP, Home working and GDPR policy includes policies and processes relating to Information security including:
• Responsibilities and Ownership
• Information Classification and Categories
• User Management
• Software Management
• Reporting Losses
• Mobile Computing
• Data retention policy
Specific processes outlined include:
• Information Classification & Handling
• Do’s and Don’ts of Information Security
• Privacy Policy Notices
• Legitimate Interest Assessment Process
• Data Protection Impact Assessments
• information Security Incident Response Procedure
• Data Protection Impact Assessments (DPIA)
• Data Breach Management
• Data Sharing

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We identify and document changes in the first instnace, normally grouping them into releases. These high level details are then fleshed out to a complete description of the change on a technical level. Changes are then developed in a completely separate environment to the customer's live servers, and contains no real data. The release is then rolled out onto a sandbox, again separate from the live environment, to allow customers to test and trial the changes. Once approved, they are then rolled out into the live environment, and monitored for 2 to 4 weeks to ensure there are no issues.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Using the tools -UptimeRobot for downtime or general application errors, Snort for internal monitoring, Cisco's alert service for intrusion on the firewall and Intruder.io (automated CREST level scan) , and monitoring the latest operating system and VM ware patches, we then assess any alerts or reports for false positives. If a vulnerability has been validated, we assess the risk. A decision is then made to fix or patch a vulnerability entirely, or, when there is no fix at present, mitigate the vulnerability by another means . The reports, alerts and logs are received regularly and form our continuous vulnerability assessment.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We use a combination of UptimeRobot for downtime or general application errors, Snort for internal monitoring, Cisco's alert service for intrusion on the firewall and Intruder.io to automatically scan for security issues in the application itself
Incident management type
Supplier-defined controls
Incident management approach
IESE have an incident management process and flowchart described our GDPR policy documentation.
Users have the ability to report incidents to specific individuals via email, website, online via carecubed community and telephone.
• initial impact assessment to decide the appropriate response.
• Investigate and classify
• Containment:
• Report: Produce a report to clarify when, what happened, what the data contained, how many individuals were affected, and the cause of the breach
• Communicate outcome as per policy
This procedure is replicated within our sub-contract organisations.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Tackling economic inequality

Tackling economic inequality

iESE have been, and continue to be, innovators in the domain of cost of care work. iESE developed the Care Funding Calculator (CFC) back in 2008 to support the management of a market in crisis. This was ground-breaking at the time – Co-designed with care providers, commissioners, and social workers to bring a robust cost of care model and benchmarking data together for the first time, to bring transparency to managing the cost of specialist care. We can therefore demonstrate collaboration throughout the supply chain, with a fair and responsible approach to working with our supply chain partners to deliver sustainable outcomes.

We have continued that engagement with multiple stakeholders to develop further modules working with the suppliers of care and Local Authorities and NHS. A user-centred approach is central to everything we do and iESE appreciate the value of stakeholder engagement and co-design of systems, an approach that has served us and our customers well, creating a sustainable eco system which is futureproof and creates resilience in the supply chain.

Our pragmatic commitment to tackling economic inequality is demonstrated by our recent development of the Fair Cost of Care model, which we offered at zero cost as we believe a transparent, fair cost of care tool would have a significant impact across the sector, supporting a sustainable market which benefits both buyers and suppliers, this tool remains free of charge as our continued commitment to the sector.

Pricing

Price
£13,000 to £27,000 a licence a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at craig.white@iese.org.uk. Tell them what format you need. It will help if you say what assistive technology you use.