Genome Analytics
Genome Analytics is a comprehensive data acquisition and analysis system for hospital management. It collects information from multiple sources, replaces the need for paper and excel spreadsheets, making the process of gathering data time efficient and user friendly. It’s algorithms enable real time data visualisation and increase managers’ situational awareness.
Features
- Real-time ward to board reporting
- Transparent data visualisation
- Customisation
- Adaptability
- Task management
- Mobile Platform Adoption
- Automated Report Transfer
- Streamlined User Interface
- CQC KLoE inclusion
- Device agnostic capability
Benefits
- Audit outcomes immediately reflected on executive dashboards
- Clear organisational performance visibility
- Trust-specific content resulting in most relevant data presentation
- Fast approval and implementation of RFCs
- Increased productivity
- Enhanced mobilty
- Reduced manual data handling
- Minimised auditor's workload
- CQC driven, well organised and structured quality management
- Cost and efficiency savings
Pricing
£0.13 a unit a day
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 12
Service ID
1 9 2 5 7 6 6 7 9 0 2 8 1 6 6
Contact
GENOME LTD
Stacey Hatton
Telephone: 07972237803
Email: stacey.hatton@xgenome.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
-
Scheduled maintenance is performed on Thursdays between 4am and 6am.
Emergency maintenance may be carried out at any time. If the emergency maintenance is required, Genome will provide a customer with an appropriate advanced notification. - System requirements
-
- Operating system - Windows 7 or later
- CPU - An Intel Pentium 4 processor or later
- RAM - 512 MB or more
- Compatible iOS or Android devices
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Support is available 8:00 - 18:00 seven days a week.
Genome operates a unified severity driven customer support model. The response time depends on impact severity as described in SLA:
Severity 1- response within 30 minutes
Severity 2 - response within 1 hour
Severity 3 - response within 12 hours
Severity 4 - response within 1 business day - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Genome provides operational support via the helpdesk. The support is free of charge and includes changes to the auditing tools, account management and full technical assistance provided by our technical account manager.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Onboarding support is provided for configuration, training, data migration, interoperability arrangements, deployment and testing. Training involves:
1. Remote training sessions through video conferences
2. On site training - demonstrations and hands-on workshops
3. User guides documentation provided for each key role.
If no data migration or interoperability arrangements are required, Genome is aiming at full onboarding process to take less than 7 working days for an average size Trust. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Customer data extraction is available in csv format. Data extraction services are free of charge.
- End-of-contract process
-
On expiry or termination of the contract Genome will:
1. Transfer all system data to the customer.
2. Revoke the client’s users’ Analytics access rights.
3. Remove the client’s users' personal information.
All the actions at the end of the contract are free of charge.
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
-
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Mobile devices are used as data acquisition and visualisation tools.
Desktop application's predominant function is to provide advanced aggregate data visualisation capability. - Service interface
- No
- API
- Yes
- What users can and can't do using the API
- Genome Analytics API allows interaction with key functionalities of the application. Users have secure access to their analytics data gathered on the server. Data retrieval is protected by secure delegated access standard.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Customisable system elements depend upon which components of the service are purchased. The examples of customisable elements include:
1. Audit structure
2. Audit locations
3. Audit questions.
Customer representatives, in cooperation with Genome’s customer support, can customise Analytics at the onboarding stage by filing out predefined forms. Requests for change can also be made while the system is operational.
Scaling
- Independence of resources
- Genome Analytics cloud provider monitors the usage and automatically adjusts capacity to maintain appropriate performance in line with customer requirements.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
The following service usage metrics will be provided:
1. Service performance
2. Service availability
3. Scheduled maintenance activities
4. Emergency maintenance activities
5. Incident response and resolution times - Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- The users can obtain a csv file with their data free of charge. We will provide a full support to the customers in performing any extraction activities including extracting data in other formats requested by the client. Extracting data in formats other than csv will be treated as an additional service and incur costs subject to prior agreement with the client and a quote by Genome.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Genome can guarantee 99% availability as per cloud service provider.
- Approach to resilience
- Available on request.
- Outage reporting
- Reports of outages are delivered via email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- The access is restricted by username and password authentication. Genome staff provides user permissions and role based access in support channels and management interface.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials Plus Scheme
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We are building the Information Security Management System and working towards ISO27001:2013 certification.
- Information security policies and processes
-
Genome adopts policies, procedures and processes created in accordance with the General Data Protection Regulation (GDPR) and ISO/IEC 27001 standard.
The information security documentation is being reviewed on a regular basis, ensuring the company is compliant with all aspects of information security. Internal and external audits of Genome’s Information Security Management System (ISMS) are carried out periodically. Any information security issues or breaches are acted upon by following the correct escalation routes as per the documented processes.
All employees and contractors of Genome have a contractual duty to follow Genome’s information security policies and procedures.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Genome applies a systematic approach to managing change as per ISO 27001.
Genome’s change management procedures are led by the CTO and Information Security Manager.
Every change undergoes a risk assessment to identify and mitigate any potential security impact the change may produce.
Changes impacting customer services are reviewed, tested, approved and communicated. Should the change pose any risks once in the live environment, rollback procedures are available. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Genome subscribes to vulnerability email alerts from Cybersecurity and Infrastructure Security Agency (CISA) and NHS Digital.
Advisories which relate to Genome’s services are risk assessed, escalated to the CTO and filtered to the team as necessary.
Genome ensures that action is scheduled and installing patches required for known vulnerabilities is conducted according to the change control procedure. Routine patches are applied on a quarterly basis. Any vulnerabilities deemed higher risk are applied more frequently based on the risk assessment. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We monitor server and firewall activities including logs and DNS requests/responses to identify malicious, unauthorized, or unexpected behaviour that may indicate a potential attempt to breach the service. Upon identification of breach or breach attempt, Genome’s Information Security Manager, together with CTO will perform a risk assessment, notify any customers that may have been affected, notify the UK authorities and block the source of the attempted breach.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Genome has incident management processes in place to ensure that the company is equipped to respond to a wide range of unexpected events that may affect the delivery of the service to the customers. Genome responds to incidents in accordance with the Business Continuity Incident Response Procedure and Information Security Incident Management Policy.
A defined process and contact route are in place for reporting of security incidents by consumers.
Genome reports security incidents of relevance to the suppliers or customers within acceptable timescales in accordance with service level agreement.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £0.13 a unit a day
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Full version of Analytics is included as a free trial for the period of 3 months.