iCompare Lite
CHKS is a leading provider of healthcare intelligence and quality improvement services. Since 1989 we have been developing hospital benchmarking and performance management solutions for healthcare organisations in over 20 countries and have worked with over 400 clients throughout the world.
Features
- Easy to export to Excel, CSV, Word and PDF files.
- Automatically updated as new national data is released
- Local data can be updated as frequently as weekly
- Various presentation options including, heat maps, charts and tables
- Help function on every page
- Reports track performance by priority indications, division, and local peers
- Fast upload of Trust data
- Shows percentile position within your peer group
Benefits
- Provides assurance to stakeholders on efficiency versus quality and care.
- Enables early detection of variations in performance
- Enables a swift response via targets and alerts functions
- Customisable scorecards to support Trust objectives
- Standard Key scorecards already configured; i.e. CQC indicators, Mortality, Efficiency
- Converts data into intelligent information to support decisions
- Enables benchmarking against other providers to become best in class
- Provides patient level data and analysis, supporting Trust improvement review
Pricing
£30,000 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 0 8 8 5 0 5 8 0 6 6 8 3 6 6
Contact
CHKS LIMITED
Gary Birkin
Telephone: 07792064558
Email: gbirkin@chks.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
- None
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Within 1 working day - conditional at extra cost - see iCompare
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Helpdesk support is available at extra cost.
Support can be included in the initial licence (see iCompare) or subscription for packaged rates, or bought individually per day as per the rate card. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Implementation is delivered in year 1 of the contract and through a combination of onsite and offsite configuration of the tool and training.
CHKS will work with the main contact to set up an implementation and user group. Implementation is based on a mix of configuring the programme to the specific requirements and structure of the trust and knowledge transfer to users and key stakeholders. As the system has been designed to be intuitive and user-friendly, there is not an intensive training requirement. This training provides a sufficient level of knowledge transfer for a core group of users to use the system and cascade their knowledge as required. It also trains system administrators in the management and configuration of the system.
We provide the training on-site, with MS Teams sessions also available. Once configuration is underway, we work with customers to agree a detailed training programme to take place over the following month with key staff groups and train local trainers to continue this work.
The training is complemented by in-built screen specific help files and a documented user manual. Further training materials and videos are available through the CHKS website. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- As our system allows the analysis and reporting of users existing data, no formal data extraction is required. Users will stop submitting their data to us and are able to export and final reports or charts in a range of formats before access is switched off.
- End-of-contract process
- If the customer does not wish to renew its contract, three months’ notice should be provided to commence the decommissioning process. The customer should make arrangements for the final data submission to CHKS to be made no less than one month before contract end date and our team will switch off data processing services to ensure no further data is uploaded. At the contract end date, access to the system will be switched off and the tool decommissioned by CHKS. The customer should use the time leading up to this date to export any reports required. This is included in the price of the contract
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There are no functional differences as both mobile and desktop users access the system through browsers. The system layout was designed to ensure that users could fully access the system regardless of whether it was a mobile or desktop device so that it delivers the full service on either.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- User can get a list of available indicators, show by's, filters, data types, site codes and they can then use these to interrogate indicator data.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Every user can customise iCompare to view and analyse information specific to them. The system has pre-populated scorecards but includes the ability for user defined and organisation ones to be created, using over 570 indicators. These scorecards can then be further customised through cluster any option in the system, creating structures specific to service users organisation. Filters can be applied to ensure users are able to have granular control over the information that they are analysing. Show by options can be used on each indicator to view sub-set of information. Organisation relevant peer groups can be created and saved for future use.
In addition to this, organisations can provide additional datasets to CHKS to be uploaded for analysis in the system.
Scaling
- Independence of resources
-
We take a number of steps to mitigate against service degradation through high usage volumes to ensure that any impact is minimal. Our hardware is specified to such a level that our clients do not notice any impact (delays are generally measured in milliseconds). Any large increase in client base would be met with an equivalent increase in hardware to retain these response times.
Elastic search has been utilised to ensure that large volumes of data can be analysed and retrieved rapidly, supporting user experience at scale.
Analytics
- Service usage metrics
- Yes
- Metrics types
- CHKS can provide service usage metrics including audit data. These include total number of user visits, individuals accessing the system, number of visit and time logged in.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
All reports in iCompare can be exported for further internal analysis or for pulling notes for case note reviews.
Users can choose what output they want the data to be displayed e.g. pdf, CSV, ODS, jpeg, and Microsoft Word and Excel. This will enhance considerably how reports are compiled and built for export purposes. - Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- JPEG
- DOC
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- Other
- Other protection within supplier network
- Between Capita network (the office) and ARC data centre Cody Park
Availability and resilience
- Guaranteed availability
- Typical SLA is 99.9% availability not including scheduled out-of-hours maintenance. Specific agreements can be discussed with individual customers.
- Approach to resilience
- We utilise ElasticSearch’s built in resilience and retain data which has been processed in backups allowing us to recover any data lost within minutes.
- Outage reporting
- Outages can be reported via email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Our dedicated consultant works with named customer contacts to identify and assign super users or system administrators. These users then have the ability to restrict how dashboards are shared across the organisation and other configurations such as the clustering of data. They are also able to set up new users with access to the system. Any user will be able to access technical support, but the named contact will be the main route to advanced support and added value services.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Lloyd's Register Quality Assurance Limited (LRQA)
- ISO/IEC 27001 accreditation date
- 27/06/2019
- What the ISO/IEC 27001 doesn’t cover
-
Finance
Administration
Marketing
Sales - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- DSPT - 23/24 Standards Exceeded
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- NHS IG Toolkit
- Information security policies and processes
-
We have a documented information security policy that is reviewed annually. CHKS recognises that information security is a key business driver and is committed to managing the security of information including:
Maintaining confidentiality – access to information is granted only to those with specified authority to view the information.
Ensuring integrity – information is accurate and up to date.
Assuring availability – information is always available to those who require it, at the right time.
Ensuring legal compliance – by making sure that CHKS is adhering to all relevant legislation.
CHKS has determined that the most effective way to manage information security is to establish an ISMS. This will be based on the information security policy (this document) and a supporting set of policies and procedures (the ISMS manual).
We monitor compliance against regular staff information security training and have a dedicated quality manager who communicates any changes or reminders to the policy that are required.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- CHKS operates a formal change control process covering minor changes (eg minor defects, low level improvements), major changes (eg as new products), and platform changes (eg software upgrades). Changes are assessed for information governance and security before proceeding to a committee for review and approval. If necessary, a full security risk assessment will be carried out, or if a change is to an existing environment and exposes no additional sensitive data then the risk assessment is carried out during ongoing ISMS risk assessments. All changes are developed in line with industry standard good practice and subject to regular penetration testing.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- All of our systems are based on the LAMP stack and are updated regularly for all software packages. Any urgent patch notifications which are made public, for the operating system or services we make use of, are updated within 24hrs of us becoming aware.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We run an internal monitoring system with multiple monitoring strategies. Any alerts are passed on to the team, 24hrs a day via mobile alerting and any issues are responded to immediately.
- Incident management type
- Supplier-defined controls
- Incident management approach
- CHKS operates an ISMS Reporting and Incident management procedure. This defines the process that staff must follow if they uncover or are involved in an incident. All incidents are reported to line management, local and divisional info sec, and senior management as needed. All incidents are logged in an internal online system and are reported monthly.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our approach to ESG -
We are committed to building a better tomorrow for our staff, customers and wider community through outstanding environmental sustainability performance.
Our vision is underpinned by five core principles:
1. Minimise our carbon emissions.
2. Reduce the environmental footprint of our operational endeavours.
3. Foster and sustain a proactive environmental sustainability ethos.
4. Cultivate sustainability initiatives.
5. Ensure environmental compliance and surpass regulatory standards.
To achieve this vision, we have a multi-step sustainability strategy, containing details of the overarching objectives, performance targets, key performance indicators and implementation mechanisms. It is continuously reviewed to ensure it is as strong as it can be. Our success also relies on effective engagement with staff, utilising and developing their skills, knowledge and understanding.
Reducing our Carbon Footprint -
The Majority of our staff are now Home based and unnecessary travel is minimised by the delivery of consultancy, training, and implementation services remotely, where appropriate. Reducing the amount of paper we generate is a key focus, and we use recycled paper - which we then recycle ourselves. We have also taken steps to recycle other materials such as plastics and cardboard. We comply with WEEE regulations and recycle our electrical items.
We have also made changes to our approach to visiting customers on-site. Where appropriate, training and consultancy can be provided virtually.
We are focused on our transition to a Cloud service company in order to provide a sustainable approach to hosting and reducing the costly or energy inefficient hardware.
Working from home is undoubtedly challenging and may have a negative impact on the wellbeing of our employees. We hosted a wide range of virtual communal events and coffee chats) to allow our staff to stay connected to each other and regularly have team meet ups.Tackling economic inequality
CHKS is committed to tackling economic inequality. We have recruitment processes which seek to eradicate biases that can perpetuate economic inequality.
Our commitment to tackling economic inequality is also exemplified in our pay reporting transparency. In addition to the legal requirements to produce a Gender Pay Gap Report, we to ensure accountability and so that we can take steps to address economic inequalityEqual opportunity
Cultivating a diverse workforce and inclusive culture is a priority for CHKS. Diversity of experience, age, race, ethnicity, culture, gender and sexual orientation provides a wide range of talent from entry level through to our leadership teams creating richer perspectives and a powerful frame of reference.
Not only is it right to recognise and celebrate differences, and ensure everyone has the opportunity to thrive.Wellbeing
We take wellbeing very seriously at CHKS, all employees have access to the following initiatives to promote wellbeing.
Establishing a Benefits hub for resources and partnering to offer discounts and classes for physical and mental wellness.
Organising virtual communal events to maintain employee connectivity and support mental wellbeing during remote work arrangements.
Pricing
- Price
- £30,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No