Odyssey is a clinical decision support system for telephone consultations. Providing intelligent decision support. Odyssey allows clinicians and non-clinicians to safely assess patients to a consistent best practice approach. By effectively helping users to meet the patients’ needs. Odyssey helps providers to make significant savings in time, effort and money
- Odyssey deployment can be embedded directly into a host system.
- Odyssey can be deployed alongside GP systems.
- Odyssey can be deployed as a standalone product.
- Odyssey can be used in a reception setting to prioritize.
- Odyssey can be used for Face to Face clinical CDSS.
- Odyssey can be used for Telephone assessments CDSS.
- Odyssey can offer self-care advice directly to a patient.
- Odyssey is unique in the way it completes clinical assessments.
- Odyssey is not an algorithmic solution.
- Odyssey has been used to triage over 30 million assessments.
- Odyssey can be used by Clinical and Non-Clinical professionals.
- Odyssey assists with recording safe robust notation of triage.
£195 to £4599 per user
Advanced Business Solutions
08451 60 61 62
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||Odyssey is currently integrated with a number of system suppliers. It is completely embedded within Adastra, Spectrum. It has the ability to work alongside GP system like EMIS and SystmOne and can also be deployed in a standalone environment.|
|Cloud deployment model||Hybrid cloud|
|Service constraints||Clinical training is required to use the clinical modules in Odyssey|
|System requirements||Please see minimum Specification for Odyssey supplied.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||For all priorities clients should expect to receive confirmation that an Incident has been raised via email within one hour. Clients may also receive additional information or be contacted by a Support Professional within this hour, depending on the priority of the incident raised.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.0 AA or EN 301 549|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||Yes, at an extra cost|
|Web chat support availability||24 hours, 7 days a week|
|Web chat support accessibility standard||WCAG 2.0 AA or EN 301 549 9: Web|
|Web chat accessibility testing||Advanced has the option of using the Live Agent Web Chat facility within Salesforce. Salesforce makes use of technology that is compliant with Section 508 of the Rehabilitation Act of 1973 and is committed that all users regardless of disability are able to access their applications. It has been tested with assistive technologies such as such as screen readers that either audibly read the text on the site or translate the text into braille.|
|Onsite support||Yes, at extra cost|
Advanced will provide a multi-tiered telephone based Service Desk, supporting our services in-line with the Clients' Terms and Conditions.
All of our Service Management processes are based on the ITILv3 framework and ISO 20000 standard for IT Service Management.
Advanced have multiple support offerings based on customers' requirements ranging from our standard offering of normal business hours to our premium service which is available 24/7 365 days per year via:
• Customer Portal
All support will be provided by remote access in-line with the clients' own security policies. Onsite support can be provided subject to contract and may incur additional cost.
As part of Advanced’s continual improvement plan, periodic service reviews will be scheduled with the client to review the ongoing support services; to include the support model and agree any relevant changes.
Support or Service Levels are agreed with the customer at the Service Design phase to ensure that we're able to provide a service that meets their business requirements. Our standard offering for application support consists of the following target response times:
Priority 1 - 1 Hour
Priority 2 - 4 hours
Priority 3 - 8 hours
Priority 4 - 24 hours
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||A comprehensive service delivery package is included with new database setups including consultative system configuration/personalisation, onsite and remote training, full project management and go live support in addition to post go live review/tweaks.|
|End-of-contract data extraction||Written into any contract is an exit clause. We are able to run through a number of options with the customers and provide a tailored archiving solution that suits their needs.|
|End-of-contract process||Unless the customer re-signs or extends their contract, a decommission process is followed to close down the database and make the data available to the provider/commissioner.|
Using the service
|Web browser interface||No|
|Application to install||Yes|
|Compatible operating systems||Windows|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||We offer a mobile version that can be accessed via a browser or directly through one of our partner apps. This is specific to the Self-Assessment module of Odyssey|
|Accessibility standards||WCAG 2.0 A|
|What users can and can't do using the API||The Odyssey API is specific to Self-Assessment module of Odyssey|
|API documentation formats|
|API sandbox or test environment||Yes|
|Description of customisation||Depending on requirements it may be applying a CSS skin|
|Independence of resources||Our services are all load tested to well in excess of any real world deployment. We use a number of load testing tools throughout development to achieve this.|
|Service usage metrics||Yes|
|Metrics types||We can provide a number of service metrics, e.g. breakdown of different types of assessments and outcomes, user performance during assessments, Self-care outcomes, time to complete assessments, most frequently used etc.|
|Reporting types||Real-time dashboards|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||Other|
|Other data at rest protection approach||SQL Server access control|
|Data sanitisation process||No|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||The solution is built on SQL back-end so any number of SQL tools would allow users with the correct access the option to extract data. We provide a comprehensive reporting option with both reporting services and BI solution.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||We undertake to provide a minimum of 99.95% availability. Although we do not always need it, we do set a contractual maintenance window of 4 hours per month, set in the small hours of a night. There are many users already on the infrastructure and we have proven to deliver at this level to them. The Managed Services environment has been purpose built between two active/active data centres for High Availability and resiliency to failure.|
|Approach to resilience||
"Data is synchronously replicated between the two centres using Microsoft and web technologies including Hyper-V Server virtualisation and SQL Availability Groups. With the technology enabling a real time replica to be created at an alternate location, it provides operational continuity in the unlikely event of a partial or complete failure of either centre.
Communication lines between the data centres, N3 and the Internet are resilient, with diverse points of presence, and have the ability to link to other data centres within the Advanced Group.
Data is then in turn backed-up using Dell DR4100 Disk Backup Appliances, de-duped and then replicated in the alternate data centre. A full weekly backup is taken and a daily differential backup, each one being automatically verified with any inconsistencies automatically and immediately flagged to our team of database administrators.
A combination of the data centres’ significant infrastructures and our active/active operating model therefore delivers a flexible, robust and proven approach to disaster avoidance and resilience and provides a high degree of business continuity
|Outage reporting||In Line with our High Severity Support Incident Process, should the service become unavailable the customer will receive both a verbal and written notification of the outage. A verbal update schedule will be agreed with the customer who will also receive written updates for the duration of the outage. The written update will include details of any progress made and the time of the next update. Following the outage a root cause analysis (RCS) report can then be made available to the customer on request. A copy if our HSSI process, Email notification and RCA report template can also be made available on request|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Odyssey uses role based access to gain access to various modules of the system.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||BSI|
|ISO/IEC 27001 accreditation date||15/04/2014|
|What the ISO/IEC 27001 doesn’t cover||All of Advanced's operations are within scope of the certificate|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security accreditations||Yes|
|Any other security accreditations||Information Governance Statement of Compliance (IGSoC) V14, L3, 100%|
|Named board-level person responsible for service security||Yes|
|Security governance accreditation||Yes|
|Security governance standards||Other|
|Other security governance standards||IGSoC Version 14|
|Information security policies and processes||Advanced have implemented IS policies to cover Data Security, Information Security Systems, Acceptable Use, Data Protection, Patient Data, Mobile Working, Access Control and Monitoring. These are all outlined in our InfoSec Manual and supported by in-depth Policy statements. Key processes have been developed and implemented which include, but are not limited to, Secure transfer of data, access provisioning and incident reporting.|
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||The configuration and change management process ensures operational systems, services and application software are subject to change control. All staff are responsible for submitting completed change requests to the change authorisation board (CAB) using the change request form. Change requests forms, before submission to the CAB must be peer reviewed and pre-authorised by the appropriate system service owners and or business stake holder. All changes are recorded, tested and verified prior to implementation, (where possible), and are communicated to relevant members of staff and users as appropriate.|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||Vulnerability management is an essential component of Advanced Information Security Program and the process of vulnerability assessment is vital to effective vulnerability management. The vulnerability assessment process provides visibility into the vulnerability of critical assets deployed in the IT Infrastructure. The process comprises of identifying critical systems, their corresponding owners, vulnerability scanning on regular basis, determining and assessing potential vulnerabilities, documenting and establishing a time line to remediate critical vulnerabilities.|
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||Advanced complies with protective monitoring in line with GPG 13.|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||Incident management control objectives are defined within our ISO 27001:2013 certified Information Security Management System and the procedures for Incident management are aligned to ITIL v3 industry best practice.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||Yes|
|Connected networks||New NHS Network (N3)|
|Price||£195 to £4599 per user|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|