Radicalogic Technologies Inc (DBA RL Solutions)

Adverse Incident and Event Management (Organisation, Patient, Equipment, Staff)

A service for healthcare professionals that provides a comprehensive safety, quality and risk management solution. Helping manage adverse incidents and events from beginning to end. It encourages event recording, includes workflow management and reporting. The solution reduces the overall severity of incidents and risks within health and social care environments.


  • Stay on top of events with severity alerts
  • Timely task reminders and scheduled reports
  • Easy to use interface and customisable forms
  • Full text search capabilities
  • Multi platform including mobile capability
  • Comprehensive audit services
  • Role based access to and views of appropriate information
  • Ability to share data within and external to an organisation
  • Customisable workflow management
  • User can easily define and create powerful reports


  • Promotes user adoption and increased incident and event reporting
  • Integrated services help everyone communicate effectively
  • Clear and concise security standards
  • Completely configurable. Tailored to current organisational practices and processes
  • Built in workflow supports standard operating procedures
  • Supports quality improvements through an accurate and comprehensive knowledgebase
  • Ease of use reduces training overhead
  • Organisational, Management and Executive dashboards in real time
  • Automate generation of external reports to regional and national authorities
  • Reduced errors through Integration with other clinical and organisational systems


£5700 per instance

Service documents

G-Cloud 9


Radicalogic Technologies Inc (DBA RL Solutions)

Peter Askew



Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints The core of RL6 was designed and built on proven Microsoft technologies, incorporating the Microsoft .NET framework, C# .NET coding, IIS Web Server and Microsoft SQL Server databases to formulate one of the most powerful Risk Management systems in the industry.

Clients should budget for some downtime per year for software and infrastructure maintenance.
System requirements
  • The clients are running a supported browser.
  • The client workstations meet or exceed the specifications provided
  • The client will install and configure the required servers
  • Client's technical staff are familiar with internal systems and settings
  • The client technology infrastructure is sufficient to support reasonable performance
  • RL solutions will be provided with access(including VPN)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times RL Solutions categorizes and prioritizes support calls using a standard severity level scale. Response times and resolution targets for the different categories of calls vary, but are documented and governed by RL Solutions’ Service Level Agreement. The online support portal is available 24/7 for all clients, with live agent support available during weekdays.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels At RL Solutions all clients receive the same level of support and as such, we do not offer different levels of support packages, or subscribe to limited support ticket approaches.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started End-user training is generally not required for those users who are simply going to be entering data into the system. This is due to the simplistic and streamlined data entry screens provided with the RL6 products. Managers require more formal training that covers some basic design aspects of the software along with more focused sessions on features and functionality, ongoing maintenance, workflow and managing files.
Administrator training is conducted throughout the system configuration phase of the implementation. Users will learn how to build fields, build forms, set up users, configure security, analyze audit logs and set up system reports and alerts in addition to other administrative duties. All training is conducted remotely unless agreed to otherwise and is supported with professionally written documentation. All clients also have access to online training courses via our online support portal.
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats Context sensitive online help is provided from within the application.
End-of-contract data extraction All data can be easily exported by your trained system administrators using the data export tools provided directly within the RL6 system. Data can be exported into delimited text file format (e.g. CSV) or into more descriptive XML file format.
End-of-contract process When the contract ends the system will no longer be accessible. It is recommended that 60-90 days prior to the end of the contract, the system administrators prepare by exporting relevant data, ensuring users are notified that the system will no longer be available and making any other plans to wind down the system. RL Solutions' support agreement does not cover activities specifically related to end of contract preparations, however we can provide additional services to help clients with e.g. data exports as an additional billable service if required.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10+
  • Firefox
  • Chrome
  • Safari 9+
Application to install Yes
Compatible operating systems Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service RL6:Mobile is an iOS and Android app that is used to easily submit incidents and manage adverse events directly from their mobile devices. Reporting and Administrative functions are not available from the mobile application.
Accessibility standards None or don’t know
Description of accessibility As solution is delivered through standard browser protocol, desktop users can take full advantage of all the accessibility services provided by Microsoft for Windows, Office and IE (or other supported browsers)
Accessibility testing No formal testing has been completed.
Customisation available Yes
Description of customisation RL6 is 100% configurable and easy to use. At RL Solutions, we don’t believe in one size fits all. You can use our software out of the box (with the built-in forms and settings) or tailor it using the built in Forms Designer to suit your organisation’s unique needs. With the Forms Designer, RL6 forms are completely configurable by your trained system administrators, which means you can build fields and forms that resonate with your user audience. This helps foster adoption of the system and maintains a level of familiarity with the data being captured. It also ensures you can evolve the software to match the evolution of your Risk Management initiative.


Independence of resources By providing balanced services and infrastructure for the clients and by ensuring that industry standard capacity management processes are in place.


Service usage metrics Yes
Metrics types RL Solutions offers a System Health Check service which provides analytics on user behaviour in the system. Metrics include general usage statistics all the way through to form, field and field value usage.
Reporting types Regular reports


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach Data at rest is encrypted using native MS SQL Server encryption (TDE), drive encryption or a combination of both. Infrastructure locations will also have physical access controls, complying with SSAE-16.
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach RL Solutions offers the RL6 File Interchange Module that allows users to transfer data into and out of the product using industry-standard CSV and XML data formats. This makes it very easy to import events from other systems into RL6 and to export and incorporate meaningful, structured data into other third-party systems that use this type of data (including standards and governing bodies).

Data from any report can also be exported directly from the report viewer in a variety of different formats including CSV and XLS file formats.
Data export formats
  • CSV
  • Other
Other data export formats XML
Data import formats
  • CSV
  • Other
Other data import formats XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Different SLAs can be agreed upon based on the needs of the client. Uptime service level agreements for the software and infrastructure would be determined between RL Solutions and the client.
Approach to resilience Available on request
Outage reporting We report service outages via email alerts.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels RBAC can be determined and configured in several ways including, as an example, using Role and Scope as defined in MS Active Directory.
Access restriction testing frequency At least once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security No
Security governance accreditation Yes
Security governance standards Other
Other security governance standards As security governance in this regard refers to keeping information assets secure, this would be managed by the selected infrastructure provider / private cloud provider selected by RL Solutions and the client .
Information security policies and processes RL Solutions has the following defined policies, which are managed and maintained by our Director of Information Technology. All Plans and Policies are reviewed and updated at least annually.
- Risk Management policy
- Information Security policy
- HR Policy including New Hire, Termination and Transfer
- System Development / Change management policy
- Incident Management policy
- Business Continuity policy
- Business Continuity Plan
- Disaster Recovery policy
- Disaster Recovery Plan
- Privacy Policy
- Privacy Incident Response Plan

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach IP and Risk Management policies are responsible for managing the service components and ongoing assessment of security risks. Our products are based on standard industry technologies and conform with manufacturers best practices and policies.
Vulnerability management type Supplier-defined controls
Vulnerability management approach It is our policy to engage with an external third party security company to perform annual Penetration (including MPT) and Vulnerability testing of the RL6 application and infrastructure. These tests supplement our own internal vulnerability and penetration testing. Patches for any medium and above identified vulnerabilities are priority patched. We utilize industry standard scanning tools which automatically subscribe us to threat definitions.
Protective monitoring type Supplier-defined controls
Protective monitoring approach RL Solutions has a defined process to provide notify clients by phone or email in the event of unauthorized access, information security events and/or if a breach event occurs. Security Incident and breach response processes are defined as part of the IT Policies and Risk Management Policy and are considered critical events requiring immediate action and remediation. SIEM tools used by the mutually agreed upon Cloud service provider / Infrastructure provider will be used to capture all core system logs to identify aberrant behavior and supplement with the RL6 logs to proactively identify risk.
Incident management type Supplier-defined controls
Incident management approach Users utilize a formal ticketing system, which allows users to report and monitor the progress of their events. Processes for common events are automated, and are further enhanced based on event severity

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £5700 per instance
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑