Inter-AHP (Allied Health Professionals)
An Integrated suite of Allied Health professional information management modules (Physiotherapy, Occupational Therapy, Speech and Language Therapy, Nutrition and Dietetics, Special Diet Requesting, Social Work, and Sleep Laboratory). Its a repository of allied health clinical data including: Diagnosis, Treatment plans & outcomes for your patients and department resource utilisation reporting.
Features
- Real time access to Allied Health utilisation and outcome information.
- Manage and share patient data in a controlled manner.
- Discharge Summary available at the end of each patient episode.
- Manage and track direct and indirect patient care activities
- Details of patients’ episodes, visits, interventions and outcomes are recorded.
- Real time reports available on all the functionalities of application.
- Reporting at specialty, Location and Clinician level
- Support for a fully Electronic Allied Health Patient Record
- Shared care (information access) to required Clinical User
- Shared Discharge Summary of AHP Care
Benefits
- Inter-AHP helps staff manage and track patient Episodes and Visits
- Data available when required
- Resource Utilisation statistics.
- Reports can be easily printed and shared across users
- Support for a fully Electronic Allied Health Patient Record
- Holds patients’ key treatment and episodic information
- Intuitive and simple to use interface.
Pricing
£43 to £53 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 11
Service ID
3 7 4 8 5 9 2 6 7 3 6 6 3 6 0
Contact
DMF Systems
Declan FitzGerald
Telephone: +44 161 408 4412
Email: declan@dmf.ie
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Private cloud
- Community cloud
- Service constraints
- No
- System requirements
-
- Windows 7, 8, 8.1, 10
- Windows Server 2012. Windows Server 2014
- IIS Manager 6 or above
- SQL Server 2012, 2014
- .NET 4.5.2 Framework
- INTERNET EXPLORER 11
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- With in 4 hours after issuing ticketing.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Our standard support service includes access to an assigned Account Manager. This person will manage and coordinate technical resources should they be required. Our standard Take-on service is also managed by the assigned Account Manager. User training services may be provided as an additional service. This service may be secured through the assigned Account Manager
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We provide the following as part of the onboarding service:
HL7 Integration Specialist to work with the Trust IE team.
We provide a configuration specialist to work with the trust to configure the system to support Trust specific configuration work,
We provide System Administrator Training to assist with the Train the Trainer implementation methodology
We provide both on-line training and on-line user documentation. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The data is stored in a SQL Server database. We provide the database schema as part of the SQL Server database. Trust System Administration personnel may have access to the database and schema. The Trust may backup and restore the data when the contract ends. We can provide data migration services if required, these are costed and provide if required.
- End-of-contract process
- The SQL Server database is available to the Trust & the Trust database administration resources. The database schema is provided as part of the service. If further assistance to migrate the data is required we can provide costs for such services
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Full application is accessible at any device.
- Service interface
- No
- API
- No
- Customisation available
- Yes
- Description of customisation
- Data Capture screens may be modified to include site specific requirements. Reports and Documents created by the system may also be customised. Such customisation is carried out as part of the service delivery/on-boarding. This may include insertion of Site Logo's, Site contact information etc.. Such customisation/Configuration is carried out by DMF Systems resources from specifications provide by the trust.
Scaling
- Independence of resources
- Servers are dedicated to the Trust, therefore we do not share servers across trusts.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide usage information as follows: Number of users logging into the system by day, week, month Number of user sessions by day, week, month Number of records in the system, Patients, Episodes of care, Documents etc.
- Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Export of data is normally performed by the trust using standard SQL Server Backup.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
- SQL Server Backup
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- HL7 TCP/IP Interface with the Trust Integration Engine.
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.99%, assured by contractual commitment
- Approach to resilience
- Assured by Contractual Commitment.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- We recommend the connection between the Trust network and the Hosted Network should utilise Active Directory. Active Directory, configured as a 'Trusted' connection will allow access rights configured by the Trust to be shared with the hosted solution. The application software is Active Directory compliant.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
- Our hosting partner RackSpace have all the above accreditations
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Information security is regarded as critical to DMF Systems and is part of our organisational culture. An encryption policy applies to all DMF employees, contractors and other agents that transmit DMF confidential business via electronic form. Its purpose is to ensure that confidential Business and Health Information in electronic form is safeguarded by means of encryption. All employees are required to sign a patient confidentiality agreement with the understanding that the utmost professional code of conduct is observed at all times in relation to patient data; employment contracts have also a specific requirement linked to disciplinary procedures if this confidentiality is broken. As an IS0 9001:2008 certified company Management take seriously their role in demonstrating leadership to ensure the applicable statutory and regulatory requirements are determined, understood and consistently met. Any breach or potential breach is reported in the first instance to both the CTO and the MD of the company. Spot checks and regular reviews are also conducted by Management to ensure our policies are adhered to.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- DMF Systems follows industry best practice in developing solutions by designing and developing high quality software. No unauthorised changes to software are made. All software releases and patches must endure a lengthy validation process; this is carried out within the organisation and also externally within the site environment prior to going live.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We assess potential threats to the services through automated log/audit inspection. We deploy tools/api's that support the SolarWinds application software/ server hardware and software/firewall monitoring. We normally can identify and resolve issues before the system users notice an issue. On discovery of a system issue, we immediately commence fault correction deployment and will deploy required corrective actions/patches to your services
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We assess potential threats to the services through automated log/audit inspection. We deploy tools/api's that support the SolarWinds application software/ server hardware and software/firewall monitoring. We normally can identify and resolve issues before the system users notice an issue. On discovery of a system issue, we immediately commence fault correction deployment and will deploy required corrective actions/patches to your services.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incident management processes are in place for the service and are actively deployed in response to security incidents. Our policy is to provide support with the greatest speed and accuracy to meet the customer expectation on software products. Helpdesk provides phone and email support as well as direct dial-in to the site so that our client can get their problem dealt with in the agreed amount of time. The developer assigned to solve the support issue takes responsibility to ensure that solutions relate to the time-frame set down by management in respect to the support call priority.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £43 to £53 a user a month
- Discount for educational organisations
- No
- Free trial available
- No