Endoscopy Day Case Surgery Mobile Application
This app offers support for patients who are preparing for a Day Case procedure for Endoscopy Day Case Diabetic and Non-Diabetic. The app is designed to accompany your appointment letter, which will clearly state the procedure you are booked in for and at what hospital.
Features
- Using PRISM APIs to display DoS information to the serviceuser
- Easy to use, simple design
- Partnership working and collaboration of expertise
- Available on multiple platforms e.g. Apple and Andriod
- Responsive design so content is accessible on smartphone and tablet
- Fully offline app allowing users to access whenever, wherever
- Use of text, audio and video formats
- Working concept to ensure the design fits the brief
- Ongoing support available
- Facilitation of launch: Apple App Store and Google Play
Benefits
- Access a wider audience
- Empowers patients to make an informed decision about their care
- Can be used as an educational tool for professionals
- Growing market, with more people accessing information digitally
- Use of technology facilitates better communication
- Interactive and intuitive design
- Multimedia content is easier to follow and accessible
- Negates the need for paper leaflets
Pricing
£500 a licence a year
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at lpt.lhis.info@nhs.net.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 11
Service ID
2 8 0 4 3 5 9 7 8 7 2 0 1 6 5
Contact
Leicestershire Health Informatics Service
LHIS
Telephone: 01162953500
Email: lpt.lhis.info@nhs.net
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Intranet and public facing websites
- Cloud deployment model
- Private cloud
- Service constraints
- Any constraints are agreed with the customer via SLA and managed accordingly.
- System requirements
- Internet or N3 connection and a web browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times agreed by SLA. LHIS service desk operates 07:00 to 20:30 Monday to Friday and 08.00 to 13.00 Saturday excluding weekends and UK Bank Holidays. A 24 hour out of hour’s service is available for an additional surcharge. We also provide out-of-hours IT and Senior Management cover where there is a priority 1, urgent loss of service which has a direct impact on patient care and where there is no alternative.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Typically an SLA is drawn up detailing availability, resilience, redundancy and support arrangements and this is then managed during the lifetime of the system.
Table 3 and Table 4 in the attached service definition show the standard severity matrix and response times within LHIS (which may differ if requiredl). When calls are logged with our service desk we grade them with severities depending on the nature of the issue. The service
desk operates according to ITIL change management procedures. Response time shown in the attachments. These standards are negotiable if required to meet customer needs, however customers should note this may have an impact on the service price. LHIS uses back office support and system functions from with the UK. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
The on boarding process is managed according to PRINCE 2 project management principles and includes the following:
• Initial set up and testing before handover - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- In the rare event that a customer decides to terminate the service LHIS will provide the SharePoint data in electronic format. Please note depending on the volume of data and customers preferred method of receipt this may incur a fee.
- End-of-contract process
- Once the data is securely transferred LHIS will securely delete the historical data unless otherwise requested by the customer.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Optimised website view for mobiles
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- With the way in which the PRISM platform has evolved, numerous APIs have been developed to provide the option for the rich content and data that is held, to be presented to different audiences and platforms, if appropriate. LHIS have an API ready to go to present service user (patient / carer) relevant content from the service directory (DoS) and the resource library to other digital platforms, in particular websites and mobile apps. This content includes presenting clinical multi-media videos (such as exercise videos), patient leaflets and other condition specific patient information to a webpage on a website or an android or IoS (Apple) device either providing both on-line or with off-line capabilities if there is no internet connection. There are a full library of APIs ready to either plug-in to pre-existing live health care sites or systems in that are new and in development.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Product can be branded to fit in with customer's existing brand guidelines.
Specific access can be given to specific users.
Scaling
- Independence of resources
- Dedicated resource with agreement with the customer via SLA
Analytics
- Service usage metrics
- Yes
- Metrics types
- API: JavaScript, ASP.NET, REST/OData
- Reporting types
- API access
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Other
- Other data at rest protection approach
- Cyber Essentials Plus and ISO 27001
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Documents can be downloaded direct from the site.
- Data export formats
- Other
- Other data export formats
- Format in which they were uploaded
- Data import formats
- Other
- Other data import formats
- Microsoft Office
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- SLAs are agreed on a customer to customer basis as they are bespoke to the contract.
- Approach to resilience
- Available on request
- Outage reporting
- Send email alerts and a customer facing dashboard
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- User access controls are assigned according to the requirements of the user and organisation via user access profiling
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- May 2016
- What the ISO/IEC 27001 doesn’t cover
- Current coverage = management of email
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Cyber Essentials
- ISB 1596 Secure Email Standard
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Tigerscheme
- Information security policies and processes
- Public Sector and NHS standards for Information Security. ISO 27000 accredited.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We operate according to ITIL change management procedures
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We operate a security and vulnerability service which is run on a routine and cyclical basis this uses industry standard tools such as Nessus. We are also part of the CareCert alerting system.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We have a formalised incident response methodology which is designed to address issues and threats as they are identified.
These incidents are addressed with defined timescales, depending on their severity. - Incident management type
- Supplier-defined controls
- Incident management approach
- Incident response processes are defined through NHS security and governance standards. These are delivered through local policy provisions.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- NHS Network (N3)
- Health and Social Care Network (HSCN)
Pricing
- Price
- £500 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at lpt.lhis.info@nhs.net.
Tell them what format you need. It will help if you say what assistive technology you use.