Genome Analytics

Genome Analytics is a comprehensive data acquisition and analysis system for hospital management. It collects information from multiple sources, replaces the need for paper and excel spreadsheets, making the process of gathering data time efficient and user friendly. It’s algorithms enable real time data visualisation and increase managers’ situational awareness.


  • Real-time ward to board reporting
  • Transparent data visualisation
  • Customisation
  • Adaptability
  • Task management
  • Mobile Platform Adoption
  • Automated Report Transfer
  • Streamlined User Interface
  • CQC KLoE inclusion
  • Device agnostic capability


  • Audit outcomes immediately reflected on executive dashboards
  • Clear organisational performance visibility
  • Trust-specific content resulting in most relevant data presentation
  • Fast approval and implementation of RFCs
  • Increased productivity
  • Enhanced mobilty
  • Reduced manual data handling
  • Minimised auditor's workload
  • CQC driven, well organised and structured quality management
  • Cost and efficiency savings


£0.13 a unit a day

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

1 9 2 5 7 6 6 7 9 0 2 8 1 6 6


GENOME LTD Stacey Hatton
Telephone: 07972237803

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
Scheduled maintenance is performed on Thursdays between 4am and 6am.

Emergency maintenance may be carried out at any time. If the emergency maintenance is required, Genome will provide a customer with an appropriate advanced notification.
System requirements
  • Operating system - Windows 7 or later
  • CPU - An Intel Pentium 4 processor or later
  • RAM - 512 MB or more
  • Compatible iOS or Android devices

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support is available 8:00 - 18:00 seven days a week.

Genome operates a unified severity driven customer support model. The response time depends on impact severity as described in SLA:

Severity 1- response within 30 minutes
Severity 2 - response within 1 hour
Severity 3 - response within 12 hours
Severity 4 - response within 1 business day
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Genome provides operational support via the helpdesk. The support is free of charge and includes changes to the auditing tools, account management and full technical assistance provided by our technical account manager.
Support available to third parties

Onboarding and offboarding

Getting started
Onboarding support is provided for configuration, training, data migration, interoperability arrangements, deployment and testing. Training involves:

1. Remote training sessions through video conferences
2. On site training - demonstrations and hands-on workshops
3. User guides documentation provided for each key role.

If no data migration or interoperability arrangements are required, Genome is aiming at full onboarding process to take less than 7 working days for an average size Trust.
Service documentation
Documentation formats
End-of-contract data extraction
Customer data extraction is available in csv format. Data extraction services are free of charge.
End-of-contract process
On expiry or termination of the contract Genome will:

1. Transfer all system data to the customer.
2. Revoke the client’s users’ Analytics access rights.
3. Remove the client’s users' personal information.

All the actions at the end of the contract are free of charge.

Using the service

Web browser interface
Application to install
Compatible operating systems
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Differences between the mobile and desktop service
Mobile devices are used as data acquisition and visualisation tools.

Desktop application's predominant function is to provide advanced aggregate data visualisation capability.
Service interface
What users can and can't do using the API
Genome Analytics API allows interaction with key functionalities of the application. Users have secure access to their analytics data gathered on the server. Data retrieval is protected by secure delegated access standard.
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Customisation available
Description of customisation
Customisable system elements depend upon which components of the service are purchased. The examples of customisable elements include:

1. Audit structure
2. Audit locations
3. Audit questions.

Customer representatives, in cooperation with Genome’s customer support, can customise Analytics at the onboarding stage by filing out predefined forms. Requests for change can also be made while the system is operational.


Independence of resources
Genome Analytics cloud provider monitors the usage and automatically adjusts capacity to maintain appropriate performance in line with customer requirements.


Service usage metrics
Metrics types
The following service usage metrics will be provided:

1. Service performance
2. Service availability
3. Scheduled maintenance activities
4. Emergency maintenance activities
5. Incident response and resolution times
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
The users can obtain a csv file with their data free of charge. We will provide a full support to the customers in performing any extraction activities including extracting data in other formats requested by the client. Extracting data in formats other than csv will be treated as an additional service and incur costs subject to prior agreement with the client and a quote by Genome.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Genome can guarantee 99% availability as per cloud service provider.
Approach to resilience
Available on request.
Outage reporting
Reports of outages are delivered via email alerts.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
The access is restricted by username and password authentication. Genome staff provides user permissions and role based access in support channels and management interface.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials Plus Scheme

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We are building the Information Security Management System and working towards ISO27001:2013 certification.
Information security policies and processes
Genome adopts policies, procedures and processes created in accordance with the General Data Protection Regulation (GDPR) and ISO/IEC 27001 standard.
The information security documentation is being reviewed on a regular basis, ensuring the company is compliant with all aspects of information security. Internal and external audits of Genome’s Information Security Management System (ISMS) are carried out periodically. Any information security issues or breaches are acted upon by following the correct escalation routes as per the documented processes.
All employees and contractors of Genome have a contractual duty to follow Genome’s information security policies and procedures.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Genome applies a systematic approach to managing change as per ISO 27001.
Genome’s change management procedures are led by the CTO and Information Security Manager.
Every change undergoes a risk assessment to identify and mitigate any potential security impact the change may produce.
Changes impacting customer services are reviewed, tested, approved and communicated. Should the change pose any risks once in the live environment, rollback procedures are available.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Genome subscribes to vulnerability email alerts from Cybersecurity and Infrastructure Security Agency (CISA) and NHS Digital.

Advisories which relate to Genome’s services are risk assessed, escalated to the CTO and filtered to the team as necessary. 

Genome ensures that action is scheduled and installing patches required for known vulnerabilities is conducted according to the change control procedure. Routine patches are applied on a quarterly basis. Any vulnerabilities deemed higher risk are applied more frequently based on the risk assessment.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We monitor server and firewall activities including logs and DNS requests/responses to identify malicious, unauthorized, or unexpected behaviour that may indicate a potential attempt to breach the service. Upon identification of breach or breach attempt, Genome’s Information Security Manager, together with CTO will perform a risk assessment, notify any customers that may have been affected, notify the UK authorities and block the source of the attempted breach.
Incident management type
Supplier-defined controls
Incident management approach
Genome has incident management processes in place to ensure that the company is equipped to respond to a wide range of unexpected events that may affect the delivery of the service to the customers. Genome responds to incidents in accordance with the Business Continuity Incident Response Procedure and Information Security Incident Management Policy.

A defined process and contact route are in place for reporting of security incidents by consumers.

Genome reports security incidents of relevance to the suppliers or customers within acceptable timescales in accordance with service level agreement.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£0.13 a unit a day
Discount for educational organisations
Free trial available
Description of free trial
Full version of Analytics is included as a free trial for the period of 3 months.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.