SMART—Structured Mortality Analysis & Review Tool
SMART is a comprehensive mortality analysis software developed with Mid and South Essex University Hospitals incorporating Medical Examiner's Scrutiny, Structured Judgement Reviews, ED, Sepsis, and LD mortality reviews. SMART provides real-time status boards, analytics, and dashboards. SMART interoperates with EPRs to help NHS Trusts meet requirements for Learning from Deaths.
Features
- Data analytics software for NHS Trusts to analyse hospital mortality
- Interoperates with EPRs, prepopulates forms with relevant coded information
- Designed to improve the mortality review process, contribute to QI
- Full, immutable, timestamped audit trail on a secure platform
- Status boards for real-time updates and tracking for Mortality Leads
- Intuitive health analytics tool, easier to use than paper, spreadsheets
- No additional logins needed. Integrates for role-based access control
- Data analyses of coded EPR deaths reveals and tracks trends
- Complies with regulations, FHIR (HL7) standards, and your Trust policies
- Configurable healthcare inspection platform with audit tools, editable audit applications
Benefits
- Helps Mortality Leads identify cases of poor care for QI
- Saves significant consultant time to focus on patient data analyses
- Minimises the cognitive burden on Mortality Leads, consultants, nurses, administrators
- Provides dashboards and updates for individual consultant revalidation and reflection
- Offers greater understanding of SHMI elements and opportunities for QI
- ED, Sepsis, and Learning Disability mortality forms allow broader focus
- Results include reduced time for bereaved to collect the deceased
- Results have included reduction in referrals to the coroner's office
- Dashboards drill down by ward, department, specialty for mortality meetings
- Tracks activities, scores, and comments to support focus on learnings
Pricing
£65,000 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 11
Service ID
3 6 3 7 3 7 7 3 7 1 5 8 4 1 7
Contact
Acadiant Limited
Jackie Kestenbaum, PhD
Telephone: 0203 974 1159
Email: gcloud@acadiant.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
- Supports any client device and a wide variety of server operating systems and configurations. Will conform to existing infrastructure.
- System requirements
-
- Client: Modern browser or mobile device. Modern client operating system.
- Server: Any Modern Unix (Linux, MacOS) or Windows OS
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response time is same day. Emails are continually monitored during business hours Monday-Friday, 9-5, with responses as soon as possible during business hours. After hours and weekend response time depends on the urgency of the issue, though we do aim to respond within the day.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- The annual subscription includes unlimited remote support via telephone and email. Implementation includes on-site visits as necessary for full interoperability. A technical account manager is supplied.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- On-site training, documents, and videos. The software is designed to be intuitive and lead the first-time user through the process.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
- Video
- End-of-contract data extraction
- All data is downloadable in various formats at any time.
- End-of-contract process
- At the end of the contract, if the Buyer wishes, Acadiant can provide transitional access to SMART for an agreed period beyond the contract end date, at an agreed price, to ensure smooth transition to a successor. All access will be cancelled. All data can be returned to the Buyer in a requested format such as .xlsx or other spreadsheet, .csv. All personalised data will be deleted or destroyed.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There is no difference between the mobile and desktop services apart from screen size. All functions are available on all client devices.
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- We offer RESTful APIs as needed for integration on request. All data can be exported in a number of formats including .xlsx, .csv, .pdf.
- API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Users can work with us for various customisations included as part of the subscription support: for example, additional mortality forms, export for board templates, additional analytics, integration with business intelligence systems.
Scaling
- Independence of resources
- The Acadiant platform is cloud native and scales out to Web scale.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Completion with timestamp, percentage coverage, activity measurements and other metrics can be decided in consultation with the Buyer.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- All data is downloadable in various formats at any time.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- .xlsx
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- JSON
- TSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- The target is 100% uptime. SLAs are negotiable depending on the criticality of the service.
- Approach to resilience
- The Acadiant platform is cloud native. We recommend multiple separated machine rooms for hybrid on-premise, private cloud installations and multiple zones for public cloud installations.
- Outage reporting
- Integration with the customer's preferred reporting infrastructure is part of the implementation process. Email and / or phone notification can also be arranged. Service level response time to be determined in consultation with the Buyer.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
- All authentication options are available as appropriate and in conformance with customer's standards and can vary by role. Another example is Active Directory single sign-on authentication.
- Access restrictions in management interfaces and support channels
- Role-based access control by individual and group.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- All authentication options are available as appropriate and in conformance with customer's standards and can vary by role. Another example is Active Directory single sign-on authentication.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Acadiant follow best practices and work with the customer's and NHS infrastructure partners to ensure best compliance. The Acadiant platform is designed with security in its foundations.
- Information security policies and processes
- Acadiant maintain direct supervision over a small staff with privileged access and a collaborative relationship with specific customer staff. A high degree of automation reinforces policy.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- The Acadiant platform is designed to minimise the exposed attack surface. Microservices are updated frequently and the scope of service in each is limited. Any new function goes through a security review during design and existing functions are reviewed periodically.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Acadiant monitor vulnerability lists such as those maintained by NIST. Any identified security risk is patched and deployed after regression tests. The Acadiant microservice architecture minimises the scope of any vulnerability and allows for quick micro deployments.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- The Acadiant microservice architecture minimises the scope of any vulnerability and allows for quick micro deployments. Any anomaly in the data or intrusion incident results in an immediate response. Any identified security risk is patched and deployed after regression tests. We maintain full transaction logs for recovery.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incident management is defined and driven in cooperation with each customer group. Incidents are reported by telephone or email. Incident reports are provided in written form via email with on site follow up where necessary or appropriate.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- NHS Network (N3)
- Health and Social Care Network (HSCN)
Pricing
- Price
- £65,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Acadiant offer an externally hosted demonstration site on which a prospective client can safely explore the full functions of SMART using completely synthetic but realistic data. Together with the customer, Acadiant will design the integrations and interoperations required for the customer’s existing clinical management systems. Please email gcloud@acadiant.com