Sitekit Digital Health

LHCR 'Region in a Box'

Consultancy and development services to configure and deploy the target architecture for LHCR regions to establish an information sharing environment that helps health and care services continually improve treatment, tailors care to the needs of individuals, empowers people to look after themselves better and make informed health and care decisions.

Features

  • Core interoperability (e.g. Open-APIs, Record-Location, Event-Management, Longitudinal Record, PHR)
  • Reference Services (e.g. Metadata-Management, Directory of Services, Master Patient-Index)
  • Data Services (e.g. De-ID/Re-ID, Data Integration, Data Processing)
  • Information Governance & Security (e.g. Patient Choices, Authentication, IG Impementation)
  • Modern cloud-based architecture
  • Scalable
  • Based on open standards

Benefits

  • Improved citizen engagement
  • On-demand access to records
  • Support for Integrated Care
  • Improved care coordination for LTCs/complex conditions
  • Removal of paper-based overheads.
  • Improved quantity and quality of information available to citizens
  • Right information provided to health professionals at the right time
  • Real-time access to data to support resource management
  • Enable the delivery of personalised services
  • Overcome interoperability challenges

Pricing

£5000 to £7500000 per instance

Service documents

G-Cloud 11

305668819902335

Sitekit Digital Health

Daniel Moulin

0845 299 0900

DigitalHealth-Sales@sitekit.net

Service scope

Service scope
Service constraints There are no specific service constraints buyers are required to know about. Sitekit's solutions are underpinned by Microsoft's Azure Cloud platform, an open, flexible, scalable platform that address specific business and technical requirements for security, performance and operational processes. It allows custom implementations to focus on building out scenarios and applications. Azure provides a rapid, low-cost, low-risk and fail-fast platform for organisations and is backed by a cloud platform with the largest compliance portfolio in the industry.
System requirements Internet connectivity from the commissioning region's networks

User support

User support
Email or online ticketing support Email or online ticketing
Support response times The support provided via the Sitekit Service Desk is via both email and phone, Monday to Friday 9am to 5pm excluding UK bank holidays. Out of hours emergencies are ticketed via our emergency email address, which goes directly to our out of hours support.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels The following provided as standard: 1)Very High: A security breach whereby a third party gains access to personal data or an individual’s account may be compromised. A security alert that is categorised as being critical to data security. In the event of a security breach, the technician will take immediate action to limit further unauthorised access to the Infrastructure Applications. Investigative work to provide a resolution will then commence during Service Hours • Response: 30 minutes • Resolution: 8 service hours 2)High - An error that renders the software inoperative or causes the software to fail catastrophically. • Response: 1 service hour • Resolution: 16 service hours 3)Normal - An error that affects performance of the software and significantly degrades the use of the software. A security alert that is categorised as being medium severity. • Response: 1 service hour • Resolution: Best efforts to obtain resolution in 40 service hours 4)Low - An error that affects performance of the Infrastructure Applications but does not significantly degrade the use of the service. A security alert that is categorised as being low severity. • Response: 1 service hour • Resolution: Best efforts to put resolution in the next software release
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Requirements workshop + high-level architecture and envisioning
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction No persistant data is stored by LHCR Region in a Box components. Health and care data stored by health and care agencies remain the responsibility of those agencies. Personal health and care data stored in a citizen's Personal Health Record (PHR) remains the responsibility of the citizen.
End-of-contract process Off-boarding the service does not require any data extraction or removal processes. If an agency terminates the LHCR region in a box, all server instances and databases will be stopped; an audit log will be provided to the agency.

Using the service

Using the service
Web browser interface Yes
Using the web interface Services are managed via Microsoft's Azure Portal (https://azure.microsoft.com/en-gb/features/azure-portal/) This portal gives sufficiently skilled and appropriately authorised users complete control over all aspects of platform set-up and management.
Web interface accessibility standard WCAG 2.1 AA or EN 301 549
Web interface accessibility testing None, not applicable - check MS azure portal accessibility
API Yes
What users can and can't do using the API Core interoperability services contain a number of APIs which provide standardised access to reference data and IG / security services
API automation tools Other
Other API automation tools
  • Automated deployment
  • Automated real-time monitoring
  • Automated testing (e.g. Sprinkler for FHIR testing)
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type Automatic
Independence of resources LHCR region in a box is built on Microsoft's Azure - platform services designed to serve business-critical applications for many millions of users. Uptime is guaranteed by Microsoft SLAs.
Usage notifications Yes
Usage reporting Email

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
Reporting types Regular reports

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold Microsoft Azure Cloud Services

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
Backup controls According to Microsoft Azure Cloud Backup functionality: https://azure.microsoft.com/en-gb/services/backup/
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Users schedule backups through a web interface
Backup recovery Users can recover backups themselves, for example through a web interface

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99.9% Service credits if Sitekit does not meet this level. Azure services according to Microsoft Azure SLAs:https://azure.microsoft.com/en-gb/support/legal/sla/
Approach to resilience Available on request
Outage reporting Via Microsoft Azure status portal: https://azure.microsoft.com/en-gb/status/ Or additional tooling (e.g., Application Insights: https://azure.microsoft.com/en-gb/services/application-insights/) An agency may commission Sitekit to monitor and report outages on its behalf.

Identity and authentication

Identity and authentication
User authentication Username or password
Access restrictions in management interfaces and support channels Access to management interfaces and support channels is restricted via username and password.
Access restriction testing frequency At least once a year
Management access authentication Username or password
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Centre for Assessment Ltd
ISO/IEC 27001 accreditation date 24/10/2018
What the ISO/IEC 27001 doesn’t cover Our statement of applicability covers all the controls defined by ISO27001 with the exception of 14.2.7 Outsourced development and 11.1.6 Delivery and Loading Areas because they do not apply to us.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Sitekit implements an ISO27001 compliant ISMS (Information Security Management System).

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Sitekit maintains an ISO27001 certified configuration and change management process, available on request. As part of Sitekit's SDL (Secure Development Lifecycle) software components / tooling are assessed for suitability - this is recorded in Sitekit's Application Lifecyle Tool Records Report.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Sitekit maintains an ISO27001 certified vulnerability management process, available on request. Sitekit carries out threat-modelling as part of software design under the company's SDL (Secure Development Lifecycle); mitigation actions are then put in place. Sitekit will deploy patches either as part of scheduled software maintenance or immediately when Sitekit becomes aware of a Critical vulnerability. Sitekit runs frequent training sessions on emerging internet security threats.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Sitekit maintains an ISO27001 certified protective monitoring process, available on request. Potential compromises are assigned the highest priority under Sitekit's SLA (Critical) and immediately investigated.
Incident management type Supplier-defined controls
Incident management approach Sitekit maintains an ISO27001 certified incident management process, available on request. Users would raise a support request with Sitekit's support desk; Sitekit will investigate the support requests and categorise as an incident if appropriate to do so. Sitekit maintains an ISO27001 compliant incident report template, available on request.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Third-party
Third-party virtualisation provider Microsoft Azure
How shared infrastructure is kept separate Each organisation organisation occupies its own 'tenant' on the Azure platform

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes
Description of energy efficient datacentres See https://www.microsoft.com/en-us/legal/compliance/energy

Pricing

Pricing
Price £5000 to £7500000 per instance
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑