Advanced Business Solutions

Odyssey

Odyssey is a clinical decision support system for telephone consultations. Providing intelligent decision support. Odyssey allows clinicians and non-clinicians to safely assess patients to a consistent best practice approach. By effectively helping users to meet the patients’ needs. Odyssey helps providers to make significant savings in time, effort and money

Features

  • Odyssey deployment can be embedded directly into a host system.
  • Odyssey can be deployed alongside GP systems.
  • Odyssey can be deployed as a standalone product.
  • Odyssey can be used in a reception setting to prioritize.
  • Odyssey can be used for Face to Face clinical CDSS.
  • Odyssey can be used for Telephone assessments CDSS.
  • Odyssey can offer self-care advice directly to a patient.

Benefits

  • Odyssey is unique in the way it completes clinical assessments.
  • Odyssey is not an algorithmic solution.
  • Odyssey has been used to triage over 30 million assessments.
  • Odyssey can be used by Clinical and Non-Clinical professionals.
  • Odyssey assists with recording safe robust notation of triage.

Pricing

£195 to £4599 per user

Service documents

G-Cloud 9

218018440136551

Advanced Business Solutions

Bid Support

08451 60 61 62

absbidsupport@oneadvanced.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Odyssey is currently integrated with a number of system suppliers. It is completely embedded within Adastra, Spectrum. It has the ability to work alongside GP system like EMIS and SystmOne and can also be deployed in a standalone environment.
Cloud deployment model Hybrid cloud
Service constraints Clinical training is required to use the clinical modules in Odyssey
System requirements Please see minimum Specification for Odyssey supplied.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times For all priorities clients should expect to receive confirmation that an Incident has been raised via email within one hour. Clients may also receive additional information or be contacted by a Support Professional within this hour, depending on the priority of the incident raised.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Yes, at an extra cost
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard WCAG 2.0 AA or EN 301 549 9: Web
Web chat accessibility testing Advanced has the option of using the Live Agent Web Chat facility within Salesforce. Salesforce makes use of technology that is compliant with Section 508 of the Rehabilitation Act of 1973 and is committed that all users regardless of disability are able to access their applications. It has been tested with assistive technologies such as such as screen readers that either audibly read the text on the site or translate the text into braille.
Onsite support Yes, at extra cost
Support levels Advanced will provide a multi-tiered telephone based Service Desk, supporting our services in-line with the Clients' Terms and Conditions.
All of our Service Management processes are based on the ITILv3 framework and ISO 20000 standard for IT Service Management.
Advanced have multiple support offerings based on customers' requirements ranging from our standard offering of normal business hours to our premium service which is available 24/7 365 days per year via:
• Telephone
• Email
• Customer Portal
• Fax
All support will be provided by remote access in-line with the clients' own security policies. Onsite support can be provided subject to contract and may incur additional cost.
As part of Advanced’s continual improvement plan, periodic service reviews will be scheduled with the client to review the ongoing support services; to include the support model and agree any relevant changes.
Support or Service Levels are agreed with the customer at the Service Design phase to ensure that we're able to provide a service that meets their business requirements. Our standard offering for application support consists of the following target response times:
Priority 1 - 1 Hour
Priority 2 - 4 hours
Priority 3 - 8 hours
Priority 4 - 24 hours
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started A comprehensive service delivery package is included with new database setups including consultative system configuration/personalisation, onsite and remote training, full project management and go live support in addition to post go live review/tweaks.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Written into any contract is an exit clause. We are able to run through a number of options with the customers and provide a tailored archiving solution that suits their needs.
End-of-contract process Unless the customer re-signs or extends their contract, a decommission process is followed to close down the database and make the data available to the provider/commissioner.

Using the service

Using the service
Web browser interface No
Application to install Yes
Compatible operating systems Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service We offer a mobile version that can be accessed via a browser or directly through one of our partner apps. This is specific to the Self-Assessment module of Odyssey
Accessibility standards WCAG 2.0 A
Accessibility testing N/A
API Yes
What users can and can't do using the API The Odyssey API is specific to Self-Assessment module of Odyssey
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Depending on requirements it may be applying a CSS skin

Scaling

Scaling
Independence of resources Our services are all load tested to well in excess of any real world deployment. We use a number of load testing tools throughout development to achieve this.

Analytics

Analytics
Service usage metrics Yes
Metrics types We can provide a number of service metrics, e.g. breakdown of different types of assessments and outcomes, user performance during assessments, Self-care outcomes, time to complete assessments, most frequently used etc.
Reporting types Real-time dashboards

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach SQL Server access control
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach The solution is built on SQL back-end so any number of SQL tools would allow users with the correct access the option to extract data. We provide a comprehensive reporting option with both reporting services and BI solution.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability We undertake to provide a minimum of 99.95% availability.  Although we do not always need it, we do set a contractual maintenance window of 4 hours per month, set in the small hours of a night. There are many users already on the infrastructure and we have proven to deliver at this level to them. The Managed Services environment has been purpose built between two active/active data centres for High Availability and resiliency to failure.
Approach to resilience "Data is synchronously replicated between the two centres using Microsoft and web technologies including Hyper-V Server virtualisation and SQL Availability Groups. With the technology enabling a real time replica to be created at an alternate location, it provides operational continuity in the unlikely event of a partial or complete failure of either centre.
Communication lines between the data centres, N3 and the Internet are resilient, with diverse points of presence, and have the ability to link to other data centres within the Advanced Group.
Data is then in turn backed-up using Dell DR4100 Disk Backup Appliances, de-duped and then replicated in the alternate data centre. A full weekly backup is taken and a daily differential backup, each one being automatically verified with any inconsistencies automatically and immediately flagged to our team of database administrators.
A combination of the data centres’ significant infrastructures and our active/active operating model therefore delivers a flexible, robust and proven approach to disaster avoidance and resilience and provides a high degree of business continuity
Outage reporting In Line with our High Severity Support Incident Process, should the service become unavailable the customer will receive both a verbal and written notification of the outage. A verbal update schedule will be agreed with the customer who will also receive written updates for the duration of the outage. The written update will include details of any progress made and the time of the next update. Following the outage a root cause analysis (RCS) report can then be made available to the customer on request. A copy if our HSSI process, Email notification and RCA report template can also be made available on request

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Odyssey uses role based access to gain access to various modules of the system.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 15/04/2014
What the ISO/IEC 27001 doesn’t cover All of Advanced's operations are within scope of the certificate
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations Information Governance Statement of Compliance (IGSoC) V14, L3, 100%

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards Other
Other security governance standards IGSoC Version 14
Information security policies and processes Advanced have implemented IS policies to cover Data Security, Information Security Systems, Acceptable Use, Data Protection, Patient Data, Mobile Working, Access Control and Monitoring. These are all outlined in our InfoSec Manual and supported by in-depth Policy statements. Key processes have been developed and implemented which include, but are not limited to, Secure transfer of data, access provisioning and incident reporting.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach The configuration and change management process ensures operational systems, services and application software are subject to change control. All staff are responsible for submitting completed change requests to the change authorisation board (CAB) using the change request form. Change requests forms, before submission to the CAB must be peer reviewed and pre-authorised by the appropriate system service owners and or business stake holder. All changes are recorded, tested and verified prior to implementation, (where possible), and are communicated to relevant members of staff and users as appropriate.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Vulnerability management is an essential component of Advanced Information Security Program and the process of vulnerability assessment is vital to effective vulnerability management. The vulnerability assessment process provides visibility into the vulnerability of critical assets deployed in the IT Infrastructure. The process comprises of identifying critical systems, their corresponding owners, vulnerability scanning on regular basis, determining and assessing potential vulnerabilities, documenting and establishing a time line to remediate critical vulnerabilities.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Advanced complies with protective monitoring in line with GPG 13.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Incident management control objectives are defined within our ISO 27001:2013 certified Information Security Management System and the procedures for Incident management are aligned to ITIL v3 industry best practice.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks New NHS Network (N3)

Pricing

Pricing
Price £195 to £4599 per user
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑