LUCIDA MEDICAL LTD
Pi software for cancer imaging
Pi™ is AI-based software to assist radiologists to assess cancer in routine MRI scans.
Features
- Analysis of MRI for prostate cancer
- Cancer decision support
- Development of cancer imaging AI algorithms
- Cancer screening
- Cancer diagnosis
- Cancer active surveillance and monitoring
- Cancer treatment
- Risk calculation
- Cloud medical imaging and AI
Benefits
- Help early cancer diagnosis
- Cut costs through reducing avoidable biopsies
- Prioritising cases and reducing waiting times
- Saving time
Pricing
£15 to £50 a transaction
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at BusinessDevelopment@lucidamedical.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
7 2 1 0 6 1 4 7 8 5 4 7 7 3 7
Contact
LUCIDA MEDICAL LTD
Antony Rix
Telephone: 01223 921901
Email: BusinessDevelopment@lucidamedical.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
PACS services,
MRI imaging solutions,
AI orchestration solutions,
Cloud medical imaging,
Clinical decision support,
Clinical treatment management,
Patient triage solutions,
Radiology information systems,
Electronic health record / electronic medical record - Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Supports standard Intel-based cloud infrastructure
- System requirements
- Virtual machine installation with compatible Linux OS or Docker infrastructure
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 1 hour within business hours on working days in England. Next business day at weekends.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
The Lucida Standard Service Agreement includes:
• System maintained according to support plan/SLA.
• Planned maintenance to cover:
o Evaluation of imaging protocol changes or software updates, to allow checks to be repeated and updates as necessary
o Updates to the AI software
o Updates to reports and other services.
Service systems are planned to be updated regularly, typically weekly out-of-hours.
Problems will be acknowledged within 1 hour. Problems are defined as follows:
• Critical: if patient safety or integrity is endangered
• Important: if functionality and availability of the Service is severely restricted or it severely impacts one of the customer’s operations.
• Non-Critical: all other problems are characterised as Non-Critical, including where work-arounds are available.
We aim to solve critical problems within 8 Office hours.
Important problems will be solved within 16 Office hours.
Non-Critical problems will be solved with 80 Office hours or following an alternative plan agreed with the customer.
Standard service availability is 99%. Contracts over £1m will receive dedicated account management. Premium service with improved availability and response times may be ordered according the Pricing Document. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- The Software is installed under appropriate local information governance, IT and clinical safety standards. Users are offered online training and are supported with training documentation and Instructions for Use.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
• Outputs from the system are typically stored within hospital PACS and do not need duplicated or backup access from the vendor
• Offboarding typically therefore consists of archiving the services for regulatory retention purposes, and then decommissioning/deleting any applicable services/systems. - End-of-contract process
-
• Free of charge – service regulatory archiving by supplier and deletion of live services
• Professional services available for per hospital – custom extraction of and export of service data to customer via cloud or physical media (see price list)
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- Software supports standard DICOM APIs
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The supplier can customise the service with agreement, including tailoring template report format, layout and certain content, and enabling/disabling classes of output within the scope of the contract.
Scaling
- Independence of resources
- Services are dimensioned according to hospital size to cover all normal usage requirements. Spikes in demand due to migrations or outages lead to data being queued and processed in turn.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Number of scans processed
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Results saved to PACS and can be exported either through DICOM fields, JSON metadata, or other endpoints.
• AI DICOM-SC secondary capture output image showing volumes (alternative formats such as GSPS can also be supported)
• AI DICOM-SC secondary capture output image showing patient risk scores and lesion detections
• AI DICOM RT-STRUCT 3D segmentations for visualisation to support treatment and biopsy planning
• Template output report content (note that this is configurable). - Data export formats
-
- CSV
- Other
- Other data export formats
-
- DICOM
- JSON
- Data import formats
- Other
- Other data import formats
- DICOM
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Standard SLA is 99% availability. Premium SLA is 99.5% availability. If availability drops below the contracted availability level, customers will be credited 1/260th of the value of their annual contract fees for each complete working day (9am-5pm) during which the service is not available. There is no refund for parts of a working day during which the service is not available.
- Approach to resilience
- The Software is typically offered in high-availability cloud platforms offering at least 99% uptime (Standard SLA). Redundant service is provisioned where the customer orders Premium SLA.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Access restrictions in management interfaces and support channels
- Management and support interface keys are restricted to specific trained users
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- NHS DSP Toolkit, Cyber Essentials Plus. Working towards ISO 27001.
- Information security policies and processes
-
An IT security policy framework is in place and governs both operations and R&D.
Systems that may store customer and business data are protected using 2FA, strong passwords and prohibition of password sharing.
All personnel are trained on IT security including monthly training and tests.
The supplier follows and is certified to Cyber Essentials Plus.
Customer and cloud systems are operated according to ISO 27001, and work towards ISO 27001 certification is in progress.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All system software configuration is maintained using Git version control or equivalent systems, compliant with ISO 62304 and ISO 13485.
Changes require approval of a subject matter expert and testing before incorporation into production. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Threat risk is considered during risk assessment throughout the product lifecycle. Penetration testing is performed by contracted security specialists at least annually. Patches are deployed according to analysis of risk, in as little as 1 hour during business hours, or in the next maintenance window as appropriate. We subscribe to mailing lists and monitor industry providers including CERT to gain warning of known vulnerabilities.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Services are typically installed in customer's IT environment and subject to access and monitoring by customer IT. All company systems have logging, auditing and monitoring in place to supplier processes. Responses include patching, disabling accounts and increasing logging if a compromise is found. Immediate action (typically within 1 hour) is taken when potential compromises are identified, for example to implement a patch, firewall rule, blacklist or whitelist, or disable compromised accounts.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Pre-defined processes for potential data incident and security breaches. Users can report incidents through the standard support channels. Incident reports are provided by email on daily basis for serious potential breaches until resolution or closure.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Wellbeing
Fighting climate change
We support NHS Net Zero and have our own Net Zero policyWellbeing
Our services are specifically designed to help improve healthcare and disease screening, diagnosis and treatment
Pricing
- Price
- £15 to £50 a transaction
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Free pilot period 2 months
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at BusinessDevelopment@lucidamedical.com.
Tell them what format you need. It will help if you say what assistive technology you use.