Perfect Ward Ltd

Perfect Ward

Perfect Ward application is a cloud based, real time inspection and reporting tool for healthcare quality inspections. It eliminates administration by capturing inspection results directly onto Android or IOS devices and providing automated reporting. Customisable for every healthcare setting, it empowers frontline staff to own quality in their own area.


  • Real time, automated reporting including pdf reports
  • Customisable for all health and social care settings
  • Add photos, comments, weblinks to provide clarity and detailed guidance
  • Live dashboards at every level of your organisation
  • Track performance easily with access to all historical reports
  • Tag questions to customised themes eg CQC domains/organisation priorities
  • Ask the same question multiple times for patient/staff/documentation reviews
  • Personalise notifications so you can immediately address issues
  • Remote access via android and ios devices
  • Integrated action planning so you can track issue resolution.


  • Free up significant clinical time through elimination of administration
  • Provides immediate snapshot of all elements of quality organisation-wide
  • Identify common issues at every level of an organisation
  • Auditable evidence of performance for management and regulators
  • Track improvement in performance at question/area/division/site and organisational level
  • Provides reassurance on quality with both quantitative and qualitative views
  • Transparent information empowers frontline staff to address quality issues directly.
  • Unlimited users enabling widespread engagement in quality audits
  • Fully supported implementation to help you optimise your quality reviews
  • Track progress of actions post reviews


£1.58 a unit a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

1 2 1 9 4 5 6 3 1 7 9 1 5 0 5


Perfect Ward Ltd Rhian Bulmer
Telephone: 020 7420 9378

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
Perfect Ward is available on Android and iOS smartphones and tablets. It aims to be backwards compatible providing support to devices on the two previous OS versions. The app requires internet access (though can work offline during inspections).
System requirements
  • Compatible Android and iOS devices
  • Internet access
  • Ability to upgrade to the latest version of the app
  • Licences require for usage

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our response times are typically within 24 hours during Monday to Friday 9am to 5.30pm excluding bank holidays. We may take longer to respond outside office hours.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Perfect Ward support included in licence fee:
- on site and/or remote training
- set up and configuration of application for your organisation
- implementation workshops including questions/tailoring/reporting workshops designed to help you optimise the value of Perfect Ward
- user approval and administration
- help desk support provided in office hours by phone and email

We will agree with you in advance the number of days support to be provided. Additional days will be priced at £750 per day ex VAT
Support available to third parties

Onboarding and offboarding

Getting started
We provide fully supported implementation which will be agreed with users in advance. This includes:
- set up & tailoring of audits
- on site and remote training
- questions workshops
- reporting workshops

We also provide user guides as paper and electronic copies.
Service documentation
Documentation formats
End-of-contract data extraction
We will agree with users how they want to obtain their data. We can make the data available to them as pdf reports or work with them to enable a data feed to enable them to capture the raw data.
End-of-contract process
Included in the price of the contract:
At the end of contract, the customer will have the option for Perfect Ward to archive or delete their data. All historical inspection reports will be provided to the customer in an electronic form. All users access to the Perfect Ward application will be revoked.

Not included in the price of the contract:
Any additional requirements such as tailored data or reports will be subject to additional costs.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Differences between the mobile and desktop service
Mobile service enables users to carry out inspections, review results, personalise settings and notifications.
Desktop service provides access to automated pdf reports and action planning management.
Service interface
What users can and can't do using the API
Access to an organisation's reporting data is available through an API. This is secured with an individual user token given to authorised "developer" users through our developer portal, which also includes full API documentation. Data on inspection results for all clinical areas can be drawn down from the API, along with answer-level details for all inspections. The API cannot be used to import data into the app.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Perfect Ward can be customised (by Perfect Ward) as follows:
1. Customised, multiple audits with customised question text, guidance text, images and web links and answer options.
2. Customised aggregation of questions into categories and ordering of questions.
3. Customise the questions that are asked in each area and for type of inspector (clinical or non clinical)
4. Customised areas for inspection including details of those in charge and location information.
5. Customisation of grouping of organisation into divisions and sites.
6. Customisation of inspection scheduling.
7. Customisation of tags for data aggregation.

Customisation by user:
8. Setting and updating of user password
9. Customisation of user profile, team membership and contact information.
10. Customisation of alerts settings and inspection reminder for each user.


Independence of resources
The system is sized above the current demand but allows services to be scaled to meet demand. The system is monitored to identify when extra resources are required to be deployed.


Service usage metrics
Metrics types
In app reporting provides details on compliance of audits against schedule both for areas and individual inspectors.

Account management reviews will share more detailed information about number of users and inspections.
Reporting types
Real-time dashboards


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Less than once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Other data at rest protection approach
Data at rest protection is encrypted and assured by the Service provider.
Data sanitisation process
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users are able to email historical inspection reports and monthly area and organisation wide reports as a pdf document directly from the app.

Further exports of data including a data feed of inspection data into a customer's data warehouse is possible through the API, or other export scenarios may be possible, subject to additional costs.
Data export formats
Other data export formats
Data import formats
Other data import formats
We can assist importing Excel/paper inspections (may involve additional charges)

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
98% service availability, assured by Cloud Service provider assertion
Approach to resilience
We use the IaaS provider resilience mechanisms including multiple availability zones within one region.
Outage reporting
Any outages that may have impacted customers will be reported to customers via email and/or phone calls.

Identity and authentication

User authentication needed
User authentication
  • Username or password
  • Other
Other user authentication
Each registering user's details are validated with the nominated customer representative as an authorised user before the user is permitted to access the application. Access is then conducted through the app with this username and password, including SHA-2 and 2048-bit encryption.
Unless specifically requested by the customer, users must register with their organisation email (i.e. not personal emails).
Access restrictions in management interfaces and support channels
Currently end-users do not have direct access to management interfaces / support channels; administration is managed through direct phone / email / in-person discussions with customers.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We are currently progressing to achieve certification with ISO 27001 and Cyber essentials plus at end 2020/early 2021
Information security policies and processes
Overall security governance is the responsibility of the CEO with the head of each department responsible for their specific area. The CTO is responsible for all systems security as well as the security of the product. At each new phase of development (application, web portal, API etc.) the development team review with the CTO the security requirements.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our product change process employs process management systems to record all change requests and feature ideas, tracking them through project planning, product development and delivery to market. These systems provide a full change history of our products' development. Input from our users informs product decisions at all stages, so that change requests and information on user support of those changes is recorded and maintained for reference.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We conduct vulnerability scanning and device management across all external company devices through an external provider. We aim to deploy patches to devices within 48 hours.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We maintain logs of user activity and access to the system, and have a process of review of these logs for any suspicious activity. Any compromise that we are unable to reconcile would be referred to the customer concerned and if appropriate the ICO within 48 hours of discovery.
Incident management type
Supplier-defined controls
Incident management approach
We do not have sufficient volumes of "common" events to produce standard processes or reports. Users have contact details for our support team and are able to report incidents over the phone or email. We would manually report on any incidents, given the low volume.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£1.58 a unit a day
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.