Constentum Limited

Medic Coms - Secure Prioritised Clinical Messaging

Secure Prioritised Messaging for Local Primary Care Networks - built to address recognised pain points where communication is at its most difficult, Medic Coms is a simple to use, secure and fully auditable messaging system that is delivered via both desktop-based console and mobile devices.

Features

  • Reduces dependency on telephone and safer, accountable and more efficient
  • Secure, fast, easy to use, relevant and prioritised messaging
  • Users can choose One to One or Group Messaging
  • Real-time communication with message status and delivery reporting
  • Monitor response to and closure of issues raised
  • Adoption of 3 innovative and secure steps to enable communication
  • Supports localised communications networks with trusted healthcare stakeholders
  • Logged and authenticated workflows delivering non-repudiated documented procedures
  • Workflow to ensure timely response and escalation as required
  • Documented NCSC-appproved security accreditation to meet GDPR and NIS regulations

Benefits

  • Specifically designed to address unmet clinical communication needs
  • Improves secure communication across the wider care delivery network
  • Delivers time, resource and cost efficiencies driving improved patient care
  • Driving reduction in prescribing and medication errors
  • Exchanging time-critical information securely, efficiently and accountably
  • Saving clinical time making and responding to phone calls
  • Allow healthcare professionals to focus on delivering care
  • Comprehensive audit trail of all messages and interactions
  • Enables identification of trends and facilitates issue resolution activity
  • Information Governance, Data Protection Compliant and UK hosted service

Pricing

£15000 to £30000 per instance per 6 months

  • Education pricing available

Service documents

G-Cloud 11

281900416684068

Constentum Limited

Charles Ensor

07446878740

Charles@constentum.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints There are no constraints for this offering
System requirements
  • Mobile browser
  • Windows Desktop OS

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Standard Support 09:00 -17:00 (Mon to Fri excl. Bank Holidays)
Agreed Critical Support 24/7/365 (subject to additional cost and agreement with customer)
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Prioritisation and Support Levels are agreed with each customer.

Low - cosmetic or other low priority issue

Medium - application functionality or process failure (with workaround possible)

High- application functionality or process failure (no workaround possible)

Critical - application unavailable or failure affecting all users
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Constentum have a flexible approach to on-board and work with our customers to deploy a blended online experience with the suitable mix of on-line training, on-site group or individual training and personalised support.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction Constentum work with our customers to ensure that there is agreed access to any live data. Services to cover this may incur a charge.
End-of-contract process Constentum work with our customers to plan and execute an agreed and seamless contract exit.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service This is a mobile first application but there is no difference in functionality between mobile and desktop.
API No
Customisation available Yes
Description of customisation Constentum work with customers during onboarding to identify and configure any specific/additional requirements.
Constentum will make any UX or system changes while the customer can configure specific processes or workflows.

Scaling

Scaling
Independence of resources Customer environments are logically segregated to prevent users and customers from accessing resources not assigned to them.

Analytics

Analytics
Service usage metrics Yes
Metrics types App usage statistics
Case volume
User statistics
Reporting types
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Less than once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Constentum will support users in any requirement to export data.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability SLA for standard availability is 99.9%.
Any specific requirements can also be considered.
Approach to resilience Available upon request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication 2-factor authentication
Access restrictions in management interfaces and support channels Management interfaces are provided.
Each customer will have a dedicated internal administrator who will manage access for the and enable different rights depending on the internal roles.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications NCSC approved security accreditation

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Constentum will follow the principles of ISO27001 and works with clients to ensure that our information security processes match their requirements,
Information security policies and processes Constentum will follow the principles of ISO27001 and work with clients to ensure that our information security processes match their requirements.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Constentum will follow ITIL change management principles and will agree an appropriate change management process with customers.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Constentums approach to risk management includes the identification and management of risks and vulnerabilities, with a defined process in place for mitigating these and following a Vulnerability Management model.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Constentum follows a proactive approach to application security. All access is monitored and audited with potential security incidents reported and actioned by the SupportManager with immediate effect.
Constentum has a Security Incident policy which includes the relevant escalation processes related to potential incident impact.
Incident management type Supplier-defined controls
Incident management approach Constentum follow the ITIL approach to Incident Management and uses ticketing system for the management of all incidents.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £15000 to £30000 per instance per 6 months
Discount for educational organisations Yes
Free trial available No

Service documents

odt document: Pricing document odt document: Skills Framework for the Information Age rate card odt document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑