V4 Services

OPEL Dashboard

Near-real time assessment of urgent care data to generate current status of system and forecast immediate pressures.

Features

  • Data on hospital admissions, ambulances, wait times, discharges, other targets
  • Online dashboard with mobile app
  • Display of localised metrics with defined performance thresholds
  • Offer standardised level of pressure transparently across the system

Benefits

  • Provide a consistent set of escalation levels for local UCDB
  • Set clear expectations around responsibilities in response to surge pressures
  • Promote a transparent and fair response from local providers
  • Set consistent terminology
  • Partners involved become aware of system-wide pressure
  • Actions and protocols can be considered at a local level
  • Neighbouring systems can be notified and support can be considered.
  • Improve decision making across multiple organisations

Pricing

£60000 to £100000 per instance

  • Education pricing available

Service documents

Framework

G-Cloud 11

Service ID

2 3 8 8 3 7 4 6 4 0 2 8 2 8 5

Contact

V4 Services

V4 Tenders

0161 537 8200

tenders@v4services.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Microsoft Office 365
Microsoft Power BI
Cloud deployment model
Private cloud
Service constraints
Reliant on external data flow from buyer
System requirements
  • Internet connection
  • Web browser
  • Mobile phone

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Dependent on contract
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Dependent on contractual requirements
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Training and ongoing support
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Word
End-of-contract data extraction
Users supplied with access historic data for self extraction
End-of-contract process
User takes over ownership of the tool

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Optimised for smaller display
Service interface
No
API
No
Customisation available
Yes
Description of customisation
Localisation via service user agreement

Scaling

Independence of resources
Based on Microsoft Azure servers through Office 365 service with load management by area

Analytics

Service usage metrics
Yes
Metrics types
Usage, data entry
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
Other
Other data at rest protection approach
Data storage on Microsoft Azure, which is compliant with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users supplied with access historic data for self extraction
Data export formats
CSV
Data import formats
  • CSV
  • Other
Other data import formats
Excel, direct database connection

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Dependent on third party hosting services
Approach to resilience
All data hosted on Microsoft Azure servers, sonline app functionality run through Microsoft Power BI (Azure) services
Outage reporting
Returns blank fields

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Office 365 account or username/password
Access restriction testing frequency
Less than once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials
Information security policies and processes
Supplier-defined controls

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Undisclosed
Vulnerability management type
Undisclosed
Vulnerability management approach
Undisclosed
Protective monitoring type
Undisclosed
Protective monitoring approach
Undisclosed
Incident management type
Undisclosed
Incident management approach
Undisclosed

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£60000 to £100000 per instance
Discount for educational organisations
Yes
Free trial available
No

Service documents

Return to top ↑