Patient Engagement Solution & Services
PES (Patient Engagement Solution) is a complementary mobile messaging strategy. It helps to strengthen already existing healthcare systems with no need for additional software or hardware expense. We support effective communication impacting patient safety, quality and patient satisfaction. We support a wide range of mobile healthcare services.
Features
- Big Data Analytics
- Real time Data Management
- Data Ingestion (on-demand)
- Data Quality (Enrichment & Data Cleansing)
- Real- time Data Validation
- Data Visualization & Reporting
- On-Demand Analytics (Analytics as a Service)
- Automate Care Pathways
- Reduce Administrative Burden and Improve Patient Experience and Outcomes
- Digital Health Service
Benefits
- Business analytics and future forecasting
- Real time data tracking and change management
- Quick report creation based on real time data
- Data-driven enterprise practices even for non-data experts/users
- Data-driven challenges are solved in scalable and future proof solutions
- Agile transformation principles and tools to deliver business needs
- Design and delivery of Digital transformation and Data engineering solutions.
- Machine learning systems that identify patterns and make future predictions.
- Data architectures creation enables performance, compliance and maintainability.
- Data Solutions addressing root cause analyses and regulatory compliance requirements.
Pricing
£17 to £29 a user a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
7 0 5 7 3 1 0 3 0 4 9 2 7 8 7
Contact
SENTIUM TECHNOLOGIES LTD
Henry Smith
Telephone: +442074594618
Email: henry.smith@sentium-consulting.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- For Patient Engagement and Experience Service Solution, it has to have the integration/connection to EHR/EMR at the backend.
- Cloud deployment model
-
- Private cloud
- Hybrid cloud
- Service constraints
- Not Applicable
- System requirements
- Not Applicable
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Our typical SLA has 1 hour response time for "Critical" to resolving the issue/work around in 4 hours on Weekdays from 08:00-17:00 hrs.
On Weekends/Holidays we try to respond as quickly as possible. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- We use Jira Service Management ticketing tool, which provides integration to Slack as channel, and soon will be adding Microsoft Team to that. Thus, all kind of support requests can get addressed.
- Web chat accessibility testing
- We have not done any testing for assistive technology users.
- Onsite support
- Yes, at extra cost
- Support levels
-
Response Time : Weekdays 08:00-17:00 hrs
h - issuetype =Bug AND Priority = Highest
4h- issuetyoe=Bug AND Priority=High
8h - All remaining issues
Resolution Time:
4h - issuetype =Bug AND Priority = Highest
16h- issuetyoe=Bug AND Priority=High
24h - All remaining issues - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We do provide onsite traing and supply documentation/videos.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- We make available to Customer for a complete and secure (i.e. encrypted and appropriated authenticated) download file of Customer Data in XML format including all schema and transformation definitions and/or delimited text files with documented, detailed schema definitions along with attachments in their native format.
- End-of-contract process
- Shantanu to provide
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Admnistrative tasks will challenging to perform on mobile device.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- We use REST architecture which allows API providers to deliver data in multiple formats such as plain text, HTML, XML, YAML, and JSON, which is one of its most loved features.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Most of the time use of service is for viewing/reading only. But then certain usecases requires users to provide data/input, which is possible.
- Accessibility testing
- We have not done anytesting with users of assistive technology.
- API
- Yes
- What users can and can't do using the API
-
We comply with HL7-FHIR, which is a standard
Fast Healthcare Interoperability Resources (FHIR, pronounced "fire") is a standard describing data formats and elements (known as "resources") and an application programming interface (API) for exchanging electronic health records (EHR). The standard was created by the Health Level Seven International (HL7) health-care standards organization. - API documentation
- Yes
- API documentation formats
-
- HTML
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Typically, pathways and other triage are mapped during deploying the services, which is carried out by our team. Though not much customisation scope is there for end users.
Scaling
- Independence of resources
-
We do this thru excellent customer care services. To reach this potential we need to focus on getting the basics right: the digital architecture of the health and care system – the building blocks. Open standards, secure identity and interoperability are critical to the safe and successful use of technology, ensuring that systems talk to each other and that the right data gets to the right place at the right time.
We have modular systems, where any module can be easily switched on or off to cater to the requirements of user groups or divisions or organisations.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide basic metrics of the usage.
- Reporting types
-
- API access
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Users can export data in XLSX or CSV formats. Also, the tech support provides this service when needed.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- XLSX
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- We have defined and agreed SLAs as per customer needs and demands. If there are any issues with the service levels then we take it seriously and resolve them ASAP and also refund the subscriptions for the affected users.
- Approach to resilience
-
Our solution & services are designed with modern Digital technologies, data analytics, and patient-centered design thinking/approach to provide new opportunities to deliver care in more efficient, cost-effective ways – like streamlining administrative processes and overcoming geographic barriers. Digital transformation has really proved the potential to reorganize service delivery and connect disparate elements of the current fragmented health system.
However, as with all public infrastructure, governments will need to take a lead orchestrating role in the design of a future-proof digital healthcare architecture. It’s crucial governments step into that orchestrating role now, as hospitals are investing in digitalization, to avoid trapping systems in technological lock-ins and creating data silos that are difficult to unlock. This will be essential to realize the promise of digitalization in the long run. - Outage reporting
- We use "statuspage" a public dashboard as well as email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Access restrictions in management interfaces and support channels
-
We use the following approach to reduce the impact of successful attacks against privileged users:
1. Ensure privileged users carry out their administrative duties in a ‘clean’ (more trusted) environment.
2. Ensure privileged users handle their email and web browsing in a separate ‘dirty’ (less trusted) environment.
3. Consider the ‘dirty’ environment to be sacrificial, and design it in a way that anticipates compromise. When it is compromised, we are able able to find out when and how (and be able to easily recover it into a good state).
4. Use strong authentication mechanisms, such as 2-factor authentication. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We follow these practices/policies for successful information security:
1. Information and data classification — A clear classification policy helping to take control of the distribution of their security assets.
2. IT operations and administration — We ensure this to work together to meet compliance and security requirements. Teams that work together can coordinate risk assessment and identification through all departments to reduce risks.
3. Security incident response plan — Our security incident strategy provides a guideline, which includes initial threat response, priorities identification, and appropriate fixes.
4. SaaS and cloud policy — provides the organization with clear cloud and SaaS adoption guidelines, which provides the foundation for a unified cloud ecosystem.
5. Acceptable use policies (AUPs) — helps prevent data breaches that occur through misuse of company resources. Transparent AUPs help personnel in line with proper use of company technology resources.
6. Identity and access management (IAM) regulations — let IT administrators authorize systems and applications to the right individuals and let employees know how to use and create passwords in a secure way.
7. Personal and mobile devices — We have a policy for proper security of personal devices that can help prevent exposure to threats via employee-owned assets.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Our process of change management helps to increase the success of implementations while reducing risk and minimizing downtime. Standard changes are made with little to no oversight while Emergency changes require careful management and detailed analysis of change requests made.
The distinction between Standard, Normal, and Emergency Change should be observed from a conceptual perspective, beyond differences in the naming convention. It’s therefore important to differentiate three change types through careful assessment of the change requests and incidents leading to a change requirement.
These three types of approaches address issues as they occur while maintaining the constant pace of DevOps. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Our Process to manage vulnerability are
1. Identifying Vulnerabilities
2. Evaluating Vulnerabilities
3. Treating Vulnerabilities
4. Reporting Vulnerabilities .
Once a vulnerability has been validated and deemed a risk, the next step is prioritizing how we treat that vulnerability with original stakeholders, including:
Remediation: Fully fixing or patching a vulnerability so it can’t be exploited. This is the ideal treatment option that organizations strive for. We usually take 24 hrs to deploy patches.
Mitigation: Lessening the likelihood and/or impact of a vulnerability being exploited.
Acceptance: Taking no action to fix or otherwise lessen the likelihood/impact of a vulnerability being exploited. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
The protective monitoring and the technologies available to us to achieve it, including SIEM tools, Security auditing, Network analysis, Network logging, Data analysis and AI. We prefer to use SIEM tool. We respond to incidents within an hour.
Also, Analysing audit trails can assist in responding to a security incident, or fine-tuning the logging and correlation processes within the SIEM tool. It may also assist in verifying that logging is happening as predicted, and that no log sources have suddenly disappeared. This is essential while preparing any protective monitoring regime is establishing a baseline of normal behavior on the network. - Incident management type
- Supplier-defined controls
- Incident management approach
-
We do have predefined incident management process with the level of importance and seriousness (L1, L2, L3).
We follow a Five Steps of Incident Resolution:
1. Incident Identification, Logging, and Categorization
2. Incident Notification & Escalation
3. Investigation and Diagnosis
4. Resolution and Recovery
5. Incident Closure.
Users report incidents thru a ticketing system. Upon its closure the details are made available to the users thru the same system.
Once the incident is resolved, formal incident closure of the record takes place thru:
1. Communicating and confirming from users that service experience is normalized.
2. Updating configuration information where required
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Climate change has been a serious consideration for our business since the day we started operating. Although the majority of our staff is working remotely we are still very much conscious of an individual and overall impact. In our current operations, we have successfully implemented the following:
Use email for internal distribution in place of hard copies
Edit documents on-screen as much as possible to avoid printing multiple drafts
Purchase products from local suppliers to avoid long-distance shipping and packaging and from suppliers committed to environmental issues
Consider products with minimum packaging and purchase in bulk
Changing office light bulbs to LEDs
Created in-house recycling program
Educating employees about global climate change and how our daily habits can make a positive change
Eliminate the use of disposable dishware and eating utensils to cut down on waste.
We are building office space which is easily accessible via public transport and or walkable distance in order to reduce carbon print.
However, we recognize that our organization can do more, and we are continuously looking for additional goals.
Pricing
- Price
- £17 to £29 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- No