Digital Health and Care Apps & Services Portal for Commissioners and Providers
A portal solution offering a database of high quality health and care apps/digital services that have been assessed against the latest NHS guidelines and regulations. Mobile apps that have been peer reviewed suitable for your community of patients, staff or public; you can confidently select, recommend, deploy and socially prescribe.
Features
- Assessment to highest NHS Digital-approved standards
- Usable remotely, from anywhere
- Always up-to-date with current/upcoming regulation, standards & best practice
- Additional apps/wearables reviewed on request
- Store can include apps, digital services and wearables
- Configurable to show just to see the health apps/wearables required
- Highly experienced team always on call
Benefits
- Easily find and distinguish high quality medical apps/wearables
- Avoids need to conduct own app reviews and due diligence
- Raise digital literacy by involving own community in assessment
- Provide co-branded database of relevant assessed apps
- Minimise risk with white list of suitable services
- Keep up to date with latest innovation and health-app developments
- Assessment includes expert review
- Ensure compliance with all relevant laws, regulations and standards
Pricing
£1,300 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 10
Service ID
1 8 4 0 3 1 0 2 4 8 2 7 6 6 1
Contact
Our Mobile Health
<removed>
Telephone: <removed>
Email: <removed>@71b02a09-891c-45fa-8972-ad89e43aa6d9.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- N/A
- System requirements
- HSCN/N3 connectivity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We aim to respond within 2 working days.
Normal Working Week: Monday to Friday,
excluding Bank Holidays and between Christmas and New Year
Normal Working Day: 09.00-17.00 - 7.5 hours excluding travel and lunch
Office Hours 09.00-17.00 Monday –Friday
excluding Bank Holidays and between Christmas and New Year. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Our standard support is 2 working days response time within the following times, included in the service cost.
Normal Working Week: Monday to Friday,
excluding Bank Holidays and between Christmas and New Year
Normal Working Day: 09.00-17.00 - 7.5 hours excluding travel and lunch
Office Hours 09.00-17.00 Monday –Friday
excluding Bank Holidays and between Christmas and New Year
Alternative levels of support including onsite support can be organised by special arrangement. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide user documentation online as well as training over the phone or by video call.
Onsite training and workshops can be provided by arrangement. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- This service requires administrator rights access to the portal. When the contract ends, an extract of activity from the system and any associated data can be sent to you on request.
- End-of-contract process
- There are no additional costs at the end of a contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- N/A
- Accessibility standards
- WCAG 2.0 A
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
An API (REST, JSON) is available to enable the customer to present the apps and the results to their users within their own systems. The following endpoints are available:
• Authenticate: identifies the user and defines the scope of apps included
• Get Portfolios: returns a list of portfolios and their unique identifiers
• Get Apps: returns a list of all (or updated) Apps and their unique identifiers
• Get App: returns full details of a single App based on identifier
A sequence of calls to these endpoints will allow access to details either of all Apps or just those that have been updated since their last request (i.e. app records updated since the last call to the Get Apps endpoint for that authenticated user and portfolio). - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- The service can be customised with a tailored set of digital health apps and co-branding of the portal. The categories of apps can also be tailored to be relevant to the audience in question. In addition, the portal can be integrated to existing workflows using an API and single-singon.
Scaling
- Independence of resources
- We manage the scaling by reviewing monthly activity and anticipating increases in demand as new contracts are secured. Our service is based on completely virtualised servers which can be scaled on demand as necessary.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
A monthly report of:
number of apps/ services available in your service
number of registered users
number of downloads - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- On request to our administrators by phone or email.
- Data export formats
- CSV
- Data import formats
- Other
- Other data import formats
- By request to our administrators by phone or mail
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection between networks
- HSCN/N3 connectivity can be provided on request.
- Data protection within supplier network
-
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection within supplier network
- Our portal is hosted in a secure data facility, the supplier of which has accreditations and certifications that includes but is not limited to ISO27001, ISO27017, ISO27108 and Cyber Essentials Plus.
Availability and resilience
- Guaranteed availability
- The Service is available 24*7 achieving 99.9% availability.
- Approach to resilience
- Our service resilience is based on VMWare vSphere with vMotion and Distributed Resource Scheduler (DRS).
- Outage reporting
- A dashboard providing realtime status is available thru our website and we are able to automatically send email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- As well as offering individual login accounts, we are also able to offer a single signon (SSO) solution for our customers to connect their users to a co-branded App Library.
- Access restrictions in management interfaces and support channels
- Access permissions are defined within the management portal of our solution. The management interface can only be remotely accessed by a list of restricted IP addresses.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We are in the process of working towards ISO/IEC 27001
- Information security policies and processes
- The CTO and CEO discuss security standards and requirements at the monthly meeting and adhoc as necessary to cater for changes.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All changes are detailed in our change management process. Major new releases are detailed in a product specification.
Changes are reviewed against latest standards - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- The CTO receives regular notifications regarding potential threats and these are reviewed in management meetings and actioned appropriately.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Potential compromises are identified through ongoing monitoring of the platform. We assess the situation and respond according to defined processes.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Users can alert OMH to any issues or incidents via email or phone. Incidents are logged and dealt with by the relevant team as necessary. The escalation process is defined within our SLA.
Incident reports are available on request.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £1,300 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A trial may be available on request