Skip to main content

Help us improve the Digital Marketplace - send your feedback

Medical Tracker

Medical Tracker

Medical Tracker provides educational establishments with the ability to remove paperwork relating to the health of students and staff including injuries, illnesses, mental health, medical conditions and medication.

Parents and staff can be kept up-to-date via electronic notifications.

Data can then be analysed using actionable and pre-built reports.


  • Real-time incident reporting
  • Parent communication
  • Actionable reports
  • Injury, illness and mental health reporting
  • Medical condition management
  • Medication expiry tracking
  • First aid qualification tracking
  • Medication administration reporting
  • Staff communication
  • ISO 27001 certified


  • One centralised database for each school with multi-user access
  • Gain insight and analysis across your school or trust
  • Record and notify parents of incident in less than 30seconds
  • Locate past records using simple filters in one centralised system.
  • Simple to use drop-downs allows for easy recording.
  • Analysing where, when and how incidents are occurring.
  • Ensure records are accurate and compliant, and meet statutory guidelines.
  • Over 25 different alerts can be set-up on Medical Tracker.
  • Parents are kept up-to-date in real-time.


£295 to £1,745 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

8 4 1 2 0 2 6 2 2 6 4 8 0 1 2


Medical Tracker Luke O'Dwyer
Telephone: 02038680776

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
A customer needs to use a Management Information System to use Medical Tracker. An example might be SIMS, Integris G2 or Arbor.
System requirements
Management Information System

User support

Email or online ticketing support
Email or online ticketing
Support response times
Monday to Friday 9am - 5pm. We try to reply to all support queries within two hours however we have a three day SLA.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Support levels
We offer support as standard with all licences of Medical Tracker.
Support available to third parties

Onboarding and offboarding

Getting started
We provide online training as well as support guides accessed through our portal. Live webinars can be accessed as well as training videos.
Service documentation
End-of-contract data extraction
Administrators can extract all data to a .csv file.
End-of-contract process
We do not have extra charges for any part of the application.

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Medical Tracker is tablet friendly on any tablet (including ipads) with an internet connection.

The system works on mobile phones with an internet connection.
Service interface
User support accessibility
None or don’t know
Customisation available
Description of customisation
Users and teams including permission levels
Drop-down lists
Data that is imported to Medical Tracker
Notification templates for parents
Automated alerts for staff
What forms can be used
What security you have switched on - for example automatically logging users out of Medical Tracker after 20 minutes of inactivity


Independence of resources
Our servers auto-scale using Amazon AWS.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Through a .CSV file type.
Data export formats
Data import formats
Other data import formats
  • Groupcall Xporter on Demand (API Import)
  • Wonde

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We have a guaranteed uptime of 99%. If the guaranteed uptime falls outside of this quota a refund can be applied for via
Approach to resilience
Please email for a copy of our datacentre setup.
Outage reporting
Customers are kept up to date via email alerts.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Customers have full control over which users have access to what data. No user is automatically given user access.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Username or password
  • Other
Description of management access authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
No audit information available
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Citation ISO Certification Limited
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
All staff that were recruited post May 2023 are subject to
BPSS security clearance checks. Staff prior to this date all have DBS

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Full change control process is applied to the product and hosting infrastructure. This applies to all assets. Changes require CAB review and approval. Security considerations are specifically identified as a strict requirement.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Internal and external components are assessed by industry leading vulnerability scanners on a weekly basis. Additional cyber risk assessment tools monitor data feeds on an ongoing basis. Any and all findings are subject to risk assessment and suitable remediation through change control processes. Critical and Security updates to be installed within one month of release. All other available vendor updates to be installed within 3 months of release. We actively participate in a threat sharing community and monitor special interest security groups continuously.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We operate, train and regularly test a comprehensive Incident Response Programme - including forensics evidence collection capabilities. Security Incidents are responded to immediately following identification, by a our security team.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We operate, train and regularly test the full process - including forensic evidence collection processes. Security Incidents are responded to immediately following identification, by our security team. All employees are required to report any confirmed or suspected security incidents. The team can be contacted by customers, users or employees at any time via email or telephone.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

Covid-19 recovery

Covid-19 recovery

Tackling economic inequality

Tackling economic inequality

Equal opportunity

Equal opportunity





£295 to £1,745 a licence a year
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.