DMF Systems

Inter-AHP (Allied Health Professionals)

An Integrated suite of Allied Health professional information management modules (Physiotherapy, Occupational Therapy, Speech and Language Therapy, Nutrition and Dietetics, Special Diet Requesting, Social Work, and Sleep Laboratory). Its a repository of allied health clinical data including: Diagnosis, Treatment plans & outcomes for your patients and department resource utilisation reporting.

Features

  • Real time access to Allied Health utilisation and outcome information.
  • Manage and share patient data in a controlled manner.
  • Discharge Summary available at the end of each patient episode.
  • Manage and track direct and indirect patient care activities
  • Details of patients’ episodes, visits, interventions and outcomes are recorded.
  • Real time reports available on all the functionalities of application.
  • Reporting at specialty, Location and Clinician level
  • Support for a fully Electronic Allied Health Patient Record
  • Shared care (information access) to required Clinical User
  • Shared Discharge Summary of AHP Care

Benefits

  • Inter-AHP helps staff manage and track patient Episodes and Visits
  • Data available when required
  • Resource Utilisation statistics.
  • Reports can be easily printed and shared across users
  • Support for a fully Electronic Allied Health Patient Record
  • Holds patients’ key treatment and episodic information
  • Intuitive and simple to use interface.

Pricing

£43 to £53 per user per month

Service documents

G-Cloud 11

374859267366360

DMF Systems

Declan FitzGerald

+44 161 408 4412

declan@dmf.ie

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Private cloud
  • Community cloud
Service constraints No
System requirements
  • Windows 7, 8, 8.1, 10
  • Windows Server 2012. Windows Server 2014
  • IIS Manager 6 or above
  • SQL Server 2012, 2014
  • .NET 4.5.2 Framework
  • INTERNET EXPLORER 11

User support

User support
Email or online ticketing support Email or online ticketing
Support response times With in 4 hours after issuing ticketing.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support No
Support levels Our standard support service includes access to an assigned Account Manager. This person will manage and coordinate technical resources should they be required. Our standard Take-on service is also managed by the assigned Account Manager. User training services may be provided as an additional service. This service may be secured through the assigned Account Manager
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide the following as part of the onboarding service:
HL7 Integration Specialist to work with the Trust IE team.
We provide a configuration specialist to work with the trust to configure the system to support Trust specific configuration work,
We provide System Administrator Training to assist with the Train the Trainer implementation methodology
We provide both on-line training and on-line user documentation.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction The data is stored in a SQL Server database. We provide the database schema as part of the SQL Server database. Trust System Administration personnel may have access to the database and schema. The Trust may backup and restore the data when the contract ends. We can provide data migration services if required, these are costed and provide if required.
End-of-contract process The SQL Server database is available to the Trust & the Trust database administration resources. The database schema is provided as part of the service. If further assistance to migrate the data is required we can provide costs for such services

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Chrome
Application to install Yes
Compatible operating systems Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Full application is accessible at any device.
API No
Customisation available Yes
Description of customisation Data Capture screens may be modified to include site specific requirements. Reports and Documents created by the system may also be customised. Such customisation is carried out as part of the service delivery/on-boarding. This may include insertion of Site Logo's, Site contact information etc.. Such customisation/Configuration is carried out by DMF Systems resources from specifications provide by the trust.

Scaling

Scaling
Independence of resources Servers are dedicated to the Trust, therefore we do not share servers across trusts.

Analytics

Analytics
Service usage metrics Yes
Metrics types We provide usage information as follows: Number of users logging into the system by day, week, month Number of user sessions by day, week, month Number of records in the system, Patients, Episodes of care, Documents etc.
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Export of data is normally performed by the trust using standard SQL Server Backup.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats SQL Server Backup
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats HL7 TCP/IP Interface with the Trust Integration Engine.

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability 99.99%, assured by contractual commitment
Approach to resilience Assured by Contractual Commitment.
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication 2-factor authentication
Access restrictions in management interfaces and support channels We recommend the connection between the Trust network and the Hosted Network should utilise Active Directory. Active Directory, configured as a 'Trusted' connection will allow access rights configured by the Trust to be shared with the hosted solution. The application software is Active Directory compliant.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Our hosting partner RackSpace have all the above accreditations

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Information security is regarded as critical to DMF Systems and is part of our organisational culture. An encryption policy applies to all DMF employees, contractors and other agents that transmit DMF confidential business via electronic form. Its purpose is to ensure that confidential Business and Health Information in electronic form is safeguarded by means of encryption. All employees are required to sign a patient confidentiality agreement with the understanding that the utmost professional code of conduct is observed at all times in relation to patient data; employment contracts have also a specific requirement linked to disciplinary procedures if this confidentiality is broken. As an IS0 9001:2008 certified company Management take seriously their role in demonstrating leadership to ensure the applicable statutory and regulatory requirements are determined, understood and consistently met. Any breach or potential breach is reported in the first instance to both the CTO and the MD of the company. Spot checks and regular reviews are also conducted by Management to ensure our policies are adhered to.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach DMF Systems follows industry best practice in developing solutions by designing and developing high quality software. No unauthorised changes to software are made. All software releases and patches must endure a lengthy validation process; this is carried out within the organisation and also externally within the site environment prior to going live.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach We assess potential threats to the services through automated log/audit inspection. We deploy tools/api's that support the SolarWinds application software/ server hardware and software/firewall monitoring. We normally can identify and resolve issues before the system users notice an issue. On discovery of a system issue, we immediately commence fault correction deployment and will deploy required corrective actions/patches to your services
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach We assess potential threats to the services through automated log/audit inspection. We deploy tools/api's that support the SolarWinds application software/ server hardware and software/firewall monitoring. We normally can identify and resolve issues before the system users notice an issue. On discovery of a system issue, we immediately commence fault correction deployment and will deploy required corrective actions/patches to your services.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Incident management processes are in place for the service and are actively deployed in response to security incidents. Our policy is to provide support with the greatest speed and accuracy to meet the customer expectation on software products. Helpdesk provides phone and email support as well as direct dial-in to the site so that our client can get their problem dealt with in the agreed amount of time. The developer assigned to solve the support issue takes responsibility to ensure that solutions relate to the time-frame set down by management in respect to the support call priority.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £43 to £53 per user per month
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑