In Your Element Ltd (Trading as Elemental Software)

Social Prescribing Software

Elemental’s Social Prescribing platform is an easy to use, cloud-based, responsive platform that enables community referrals to be implemented, measured and delivered across numerous health and social care scenarios.


  • Social Prescription Generator
  • Health Risk Analysis
  • Reports
  • Monitoring Tool
  • Calendar System
  • Attendance Tracker
  • Analytics Module
  • Self Referral Module
  • API - Social Prescription Connector


  • Referring patients to range of quality assured community interventions
  • Helping patients better understand health risks using validated monitoring tools
  • Provide accurate epidemiological information to facilitate greater reporting
  • Track patient’s health and wellbeing improvement journey in real time
  • Generate bookings with providers using a patient's personal calendar
  • Facilitate, track and measure attendance rates
  • Provide analytics to justify commissioning
  • Provide entry point for the most activated and motivated patients


£20000 per licence per year

Service documents

G-Cloud 10


In Your Element Ltd (Trading as Elemental Software)

Liam Monk

02871 271800

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints No, there are no planned outage arrangements and it is compatible with all modern browsers.
System requirements Up to date subscription

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within a few hours during business hours Monday to Friday.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels On site training can be arranged for Licensees. The cost is dependent on the training provided.

Support is provided, this deals with usage issues of the platform and is not technical. If there are any technical issues our engineers are automatically notified and will fix the issue, and inform our support staff to notify users if necessary.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide both onsite training and online training. We provide training materials in PDF and HTML.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Users emails us and their data is compiled and sent to them in an encrypted CSV file.
End-of-contract process Including in the price of the contract is the;
-Software license
-Training (set number of days depending on the package size)
-Tech support (Monday to Friday 9am - 5pm).

At the end of the contract process the customer will contact us and their data will be compiled and sent to them in an encrypted CSV file.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Responsive platform
Accessibility standards None or don’t know
Description of accessibility No specific accessibility features added. On platform road map.
Accessibility testing No specific accessibility testing done. On platform road map.
What users can and can't do using the API We currently have an API service in development, due to be rolled out by the end this month (Mat 2018).

It provided User management (Create, Read, Update, Delete) and search features for registered and authorised users of our system via a REST interface.
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment Yes
Customisation available No


Independence of resources Our system is built to be scalable and we can provision servers to cope with demand when it arises.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Never
Protecting data at rest Other
Other data at rest protection approach Only backups are stored on secure cloud locations, and are encrypted.
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Users can contact Elemental for a copy of their data. There is a self service feature in development to handle this.
Data export formats Other
Data import formats Other
Other data import formats JSON

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network Other
Other protection within supplier network All platform data is secured on AWS. Access to server instances is via secure ssh sessions. All confidential data is encrypted.

Availability and resilience

Availability and resilience
Guaranteed availability We currently don't any service level agreements (SLAs) for availability
Approach to resilience Available on request.
Outage reporting Performance is automatically monitored and issues are sent to the engineering team via email and slack.

Service outages (scheduled/unscheduled) are made public via our Zendesk powered forum.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Username or password
  • Other
Other user authentication Multi Factor authentication is currently in development and due to be rolled out Q2/Q3 2018.
Access restrictions in management interfaces and support channels All management and support channels are secured using Username and password.

Management channels are limited to specific user roles.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Username or password
  • Other

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information No audit information available
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards IG compliant and working towards cyber essentials compliance and ISO/IEC 27001.
Information security policies and processes Security issues are flagged immediately with all senior members of staff.

Our DPO's ensure that standards are upheld, and we have regular IG meetings to continually review and update our policies.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We have no physical assets upon which live data and processes run. Our service runs on secure AWS instances. The only people with accesses to this are senior engineers who have RSA keys stored securely on their PCs, which are encrypted and password protected.
Vulnerability management type Supplier-defined controls
Vulnerability management approach All processes and data are securely stored on AWS instances, and all confidential data is encrypted.

User access is over http and is Username/Password protected. Multiple failed login attempts will lock users out of the system temporally to disrupt brute force attacks.

Multi Factor Authentication will be rolled out in Q3 2018.

Server logs are monitored and alarms set to flag suspicious activity.
Protective monitoring type Supplier-defined controls
Protective monitoring approach System logs are monitored and suspicious activity is highlighted. Users can also contact us if they suspect something.

If a compromise is suspected all senior staff are notified immediately. Senior engineers analysis the system. If a threat is found we will try blacklist the connection performing the attack, or if necessary temporally close all incoming connections to protect the data.

All relevant parties will be notified and a report given as to what happened, and if any data was compromised.

If such a incident were to occur senior engineers would respond ASAP, normally within seconds or minutes.
Incident management type Supplier-defined controls
Incident management approach We have a platform Data Protection Officer. Users can report directly to them if they suspect anything via email, phone or support website.

Incident reports are supplied over secure connection to any parties affected by a incident.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks New NHS Network (N3)


Price £20000 per licence per year
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑