Acadiant Limited

SMART—Structured Mortality Analysis & Review Tool

SMART is a comprehensive mortality analysis software developed with Mid and South Essex University Hospitals incorporating Medical Examiner's Scrutiny, Structured Judgement Reviews, ED, Sepsis, and LD mortality reviews. SMART provides real-time status boards, analytics, and dashboards. SMART interoperates with EPRs to help NHS Trusts meet requirements for Learning from Deaths.

Features

  • Data analytics software for NHS Trusts to analyse hospital mortality
  • Interoperates with EPRs, prepopulates forms with relevant coded information
  • Designed to improve the mortality review process, contribute to QI
  • Full, immutable, timestamped audit trail on a secure platform
  • Status boards for real-time updates and tracking for Mortality Leads
  • Intuitive health analytics tool, easier to use than paper, spreadsheets
  • No additional logins needed. Integrates for role-based access control
  • Data analyses of coded EPR deaths reveals and tracks trends
  • Facility to integrate with DHSC Medical Examiner digital solution
  • Complies with regulations, FHIR (HL7) standards, and your Trust policies

Benefits

  • Helps Mortality Leads identify cases of poor care for QI
  • Saves significant consultant time to focus on patient data analyses
  • Minimises the cognitive burden on Mortality Leads, consultants, nurses, administrators
  • Provides dashboards and updates for individual consultant revalidation and reflection
  • Offers greater understanding of SHMI elements and opportunities for QI
  • ED, Sepsis, and Learning Disability mortality forms allow broader focus
  • Results include reduced time for bereaved to collect the deceased
  • Results have included reduction in referrals to the coroner's office
  • Dashboards drill down by ward, department, specialty for mortality meetings
  • Tracks activities, scores, and comments to support focus on learnings

Pricing

£65000 per licence per year

  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

3 6 3 7 3 7 7 3 7 1 5 8 4 1 7

Contact

Acadiant Limited

Jackie Kestenbaum, PhD

0203 974 1159

gcloud@acadiant.com

Service scope

Software add-on or extension
No
Cloud deployment model
Hybrid cloud
Service constraints
Supports any client device and a wide variety of server operating systems and configurations. Will conform to existing infrastructure.
System requirements
  • Client: Modern browser or mobile device. Modern client operating system.
  • Server: Any Modern Unix (Linux, MacOS) or Windows OS

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response time is same day. Emails are continually monitored during business hours Monday-Friday, 9-5, with responses as soon as possible during business hours. After hours and weekend response time depends on the urgency of the issue, though we do aim to respond within the day.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
The annual subscription includes unlimited remote support via telephone and email. Implementation includes on-site visits as necessary for full interoperability. A technical account manager is supplied.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
On-site training, documents, and videos. The software is designed to be intuitive and lead the first-time user through the process.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Other documentation formats
Video
End-of-contract data extraction
All data is downloadable in various formats at any time.
End-of-contract process
At the end of the contract, if the Buyer wishes, Acadiant can provide transitional access to SMART for an agreed period beyond the contract end date, at an agreed price, to ensure smooth transition to a successor. All access will be cancelled. All data can be returned to the Buyer in a requested format such as .xlsx or other spreadsheet, .csv. All personalised data will be deleted or destroyed.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
There is no difference between the mobile and desktop services apart from screen size. All functions are available on all client devices.
Service interface
No
API
Yes
What users can and can't do using the API
We offer RESTful APIs as needed for integration on request. All data can be exported in a number of formats including .xlsx, .csv, .pdf.
API documentation
Yes
API documentation formats
Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Users can work with us for various customisations included as part of the subscription support: for example, additional mortality forms, export for board templates, additional analytics, integration with business intelligence systems.

Scaling

Independence of resources
The Acadiant platform is cloud native and scales out to Web scale.

Analytics

Service usage metrics
Yes
Metrics types
Completion with timestamp, percentage coverage, activity measurements and other metrics can be decided in consultation with the Buyer.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Less than once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
All data is downloadable in various formats at any time.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • .xlsx
  • PDF
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • JSON
  • TSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The target is 100% uptime. SLAs are negotiable depending on the criticality of the service.
Approach to resilience
The Acadiant platform is cloud native. We recommend multiple separated machine rooms for hybrid on-premise, private cloud installations and multiple zones for public cloud installations.
Outage reporting
Integration with the customer's preferred reporting infrastructure is part of the implementation process. Email and / or phone notification can also be arranged. Service level response time to be determined in consultation with the Buyer.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
All authentication options are available as appropriate and in conformance with customer's standards and can vary by role. Another example is Active Directory single sign-on authentication.
Access restrictions in management interfaces and support channels
Role-based access control by individual and group.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
All authentication options are available as appropriate and in conformance with customer's standards and can vary by role. Another example is Active Directory single sign-on authentication.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Acadiant follow best practices and work with the customer's and NHS infrastructure partners to ensure best compliance. The Acadiant platform is designed with security in its foundations.
Information security policies and processes
Acadiant maintain direct supervision over a small staff with privileged access and a collaborative relationship with specific customer staff. A high degree of automation reinforces policy.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The Acadiant platform is designed to minimise the exposed attack surface. Microservices are updated frequently and the scope of service in each is limited. Any new function goes through a security review during design and existing functions are reviewed periodically.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Acadiant monitor vulnerability lists such as those maintained by NIST. Any identified security risk is patched and deployed after regression tests. The Acadiant microservice architecture minimises the scope of any vulnerability and allows for quick micro deployments.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The Acadiant microservice architecture minimises the scope of any vulnerability and allows for quick micro deployments. Any anomaly in the data or intrusion incident results in an immediate response. Any identified security risk is patched and deployed after regression tests. We maintain full transaction logs for recovery.
Incident management type
Supplier-defined controls
Incident management approach
Incident management is defined and driven in cooperation with each customer group. Incidents are reported by telephone or email. Incident reports are provided in written form via email with on site follow up where necessary or appropriate.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • NHS Network (N3)
  • Health and Social Care Network (HSCN)

Pricing

Price
£65000 per licence per year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Acadiant offer an externally hosted demonstration site on which a prospective client can safely explore the full functions of SMART using completely synthetic but realistic data. Together with the customer, Acadiant will design the integrations and interoperations required for the customer’s existing clinical management systems. Please email gcloud@acadiant.com

Service documents

Return to top ↑