Care Sourcer

Care Sourcer Pro

Online marketplace - real time availability and pricing
Dedicated Care Matcher (individual) based within hospitals and undertaking the search for care via Care Sourcer on behalf of the patient/families
Dedicated Care Matcher would
Organise visit from provider for patient assessment
Confirm care provider as part of discharge plan with hospital


  • Real time care matching
  • Real time care provider capacity
  • Central care matching concierge support


  • Increased patient flow
  • Reduction is delayed discharge
  • Increased Patient safety
  • SAFER Patient Flow compliance
  • Improving patient choice
  • Realtime market visibility for emergency discharge requirements


£200 to £200 per transaction per day

Service documents


G-Cloud 11

Service ID

3 5 2 4 2 0 6 7 4 5 4 6 1 6 4


Care Sourcer

Andrew McGinley


Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
System requirements
  • Adequate network connections and telecommunications links
  • Up to date standards compliant web browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
We action support within one working day
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
For critical issues: * Target diagnose time = 1 hour. If this time is exceeded then client will be notified and revised time to diagnose agreed. * Target resolution time = +2 hours If this time is exceeded then client will be notified and a revised time to resolve agreed. Non-critical issues * Target response time = 1 working day * Diagnose and resolution times would be agreed with client and prioritised against outstanding work Response times are for working days only In terms of support personnel we provide the following. * We provide a dedicated account manager who acts as a single point of contact and a dedicated care matcher and engineer. * A named care matcher is available to provide online and phone support for issues relating to finding a care match. * The named engineer is available via email to resolve any faults in the system. * In the event that the named support is not available the Care Sourcer matching team and engineer team will provide contingency to maintain service levels. Support costs are covered by the licence fee.
Support available to third parties

Onboarding and offboarding

Getting started
On initiation of the service the Account Manager and named Care matcher will provide onsite training to staff. Documentation will be provided as part of the training
Service documentation
End-of-contract data extraction
Extraction of data will be aligned with the clients own data sharing policies or based on the current, relevant data protection legislation.
End-of-contract process
All relevant data will be purged according to the client's Information Security policies and / or the current relevant data protection legislation based on our IS027001 :13 accreditiation. No extra costs are charged for any end of contract activity

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
The system has been built using a responsive mobile first design approach. There is no native application for the service.
Service interface
Customisation available


Independence of resources
The service uses the AWS classic load balancer to provide load balancing across multiple Amazon EC2 instances and operate at both the request level and connection level. The load balancer distributes incoming traffic across EC2 instances in a single Availability Zone or multiple Availability Zones. The load balancer automatically scales its request handling capacity in response to incoming application traffic. The balancer detects the health of EC2 instances. When it detects unhealthy instances it no longer routes traffic to those instances and spreads the load across the remaining healthy instances.


Service usage metrics
Metrics types
Adhoc metrics are available on request regarding system usage. Future releases will have a more comprehensive set of analytics.
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
On request. Data will be provided in a commonly used machine readable format
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Service level is 99.9% availability.
Approach to resilience
The AWS cloud based service uses load balancing and autoscaling to provide resilience across multiple data centres. The AWS service monitors the load and automatically adjusts capacity to maintain steady, predictable performance according to configured levels.
Outage reporting
Email alerts are sent to the client's single point of contact and to any other designated personnel

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Permission management system - Care Sourcer grants different access permissions depending on their role
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
6th May 2019
What the ISO/IEC 27001 doesn’t cover
Exclusion of Protection of test data control. Reason for exclusion Care Sourcer does not use actual public data for testing
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Defined in ISO 27001 REC A0 Statement of Applicability and DOC A5 - Information Security Policy. Details available on request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Defined in our ISO 27001 DOC A12 Operations Security document. Details available on request,
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Defined in our ISO 27001 DOC A2 Risk Management, DOC A12 Operations Security documents. Details available on request,
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Defined in ISO 27001 DOC A16 Information Security Incident Management. Details available on request
Incident management type
Supplier-defined controls
Incident management approach
Defined in ISO 27001 DOC A16 Information Security Incident Management. Details available on request

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£200 to £200 per transaction per day
Discount for educational organisations
Free trial available
Description of free trial
Care Sourcer Solo is available for a free trial. Conditions apply.
Link to free trial

Service documents

Return to top ↑