Elemental’s Social Prescribing platform is an easy to use, cloud-based, responsive platform that enables community referrals to be implemented, measured and delivered across numerous health and social care scenarios.
- Social Prescription Generator
- Health Risk Analysis
- Monitoring Tool
- Calendar System
- Attendance Tracker
- Analytics Module
- Self Referral Module
- Referring patients to range of quality assured community interventions
- Helping patients better understand health risks using validated monitoring tools
- Provide accurate epidemiological information to facilitate greater reporting
- Track patient’s health and wellbeing improvement journey in real time
- Generate bookings with providers using a patient's personal calendar
- Facilitate, track and measure attendance rates
- Provide analytics to justify commissioning
- Provide entry point for the most activated and motivated patients
£20000 per licence per year
In Your Element Ltd (Trading as Elemental Software)
|Software add-on or extension||No|
|Cloud deployment model||Hybrid cloud|
|Service constraints||No, there are no planned outage arrangements and it is compatible with all modern browsers.|
|System requirements||Up to date subscription|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Within a few hours during business hours Monday to Friday.|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
On site training can be arranged for Licensees. The cost is dependent on the training provided.
Support is provided, this deals with usage issues of the platform and is not technical. If there are any technical issues our engineers are automatically notified and will fix the issue, and inform our support staff to notify users if necessary.
|Support available to third parties||No|
Onboarding and offboarding
|Getting started||We provide both onsite training and online training. We provide training materials in PDF and HTML.|
|End-of-contract data extraction||Users emails us and their data is compiled and sent to them in an encrypted CSV file.|
Including in the price of the contract is the;
-Training (set number of days depending on the package size)
-Tech support (Monday to Friday 9am - 5pm).
At the end of the contract process the customer will contact us and their data will be compiled and sent to them in an encrypted CSV file.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Responsive platform|
|Accessibility standards||None or don’t know|
|Description of accessibility||No specific accessibility features added. On platform road map.|
|Accessibility testing||No specific accessibility testing done. On platform road map.|
|What users can and can't do using the API||
We currently have an API service in development, due to be rolled out by the end this month (Mat 2018).
It provided User management (Create, Read, Update, Delete) and search features for registered and authorised users of our system via a REST interface.
|API documentation formats||Open API (also known as Swagger)|
|API sandbox or test environment||Yes|
|Independence of resources||Our system is built to be scalable and we can provision servers to cope with demand when it arises.|
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||Never|
|Protecting data at rest||Other|
|Other data at rest protection approach||Only backups are stored on secure cloud locations, and are encrypted.|
|Data sanitisation process||No|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||Users can contact Elemental for a copy of their data. There is a self service feature in development to handle this.|
|Data export formats||Other|
|Data import formats||Other|
|Other data import formats||JSON|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||Other|
|Other protection within supplier network||All platform data is secured on AWS. Access to server instances is via secure ssh sessions. All confidential data is encrypted.|
Availability and resilience
|Guaranteed availability||We currently don't any service level agreements (SLAs) for availability|
|Approach to resilience||Available on request.|
Performance is automatically monitored and issues are sent to the engineering team via email and slack.
Service outages (scheduled/unscheduled) are made public via our Zendesk powered forum.
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||Multi Factor authentication is currently in development and due to be rolled out Q2/Q3 2018.|
|Access restrictions in management interfaces and support channels||
All management and support channels are secured using Username and password.
Management channels are limited to specific user roles.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||You control when users can access audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||IG compliant and working towards cyber essentials compliance and ISO/IEC 27001.|
|Information security policies and processes||
Security issues are flagged immediately with all senior members of staff.
Our DPO's ensure that standards are upheld, and we have regular IG meetings to continually review and update our policies.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||We have no physical assets upon which live data and processes run. Our service runs on secure AWS instances. The only people with accesses to this are senior engineers who have RSA keys stored securely on their PCs, which are encrypted and password protected.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
All processes and data are securely stored on AWS instances, and all confidential data is encrypted.
User access is over http and is Username/Password protected. Multiple failed login attempts will lock users out of the system temporally to disrupt brute force attacks.
Multi Factor Authentication will be rolled out in Q3 2018.
Server logs are monitored and alarms set to flag suspicious activity.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
System logs are monitored and suspicious activity is highlighted. Users can also contact us if they suspect something.
If a compromise is suspected all senior staff are notified immediately. Senior engineers analysis the system. If a threat is found we will try blacklist the connection performing the attack, or if necessary temporally close all incoming connections to protect the data.
All relevant parties will be notified and a report given as to what happened, and if any data was compromised.
If such a incident were to occur senior engineers would respond ASAP, normally within seconds or minutes.
|Incident management type||Supplier-defined controls|
|Incident management approach||
We have a platform Data Protection Officer. Users can report directly to them if they suspect anything via email, phone or support website.
Incident reports are supplied over secure connection to any parties affected by a incident.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||Yes|
|Connected networks||New NHS Network (N3)|
|Price||£20000 per licence per year|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Terms and conditions document||View uploaded document|