The Savant Stock Control system (SSC) is a secure, cloud-based stock management service for clinical laboratories. The software suite covers all aspects of stock management including deliveries, issues, movements, quarantines, discards, reconciliation and reporting and ordering.
- Web application supported by handheld devices with barcode scanning.
- Delivery and issue of stock items.
- Internal and external stock movements.
- Automated supplier orders based on current stock levels.
- Multiple quarantine options - product batch and individual stock items.
- Stock discard – select products and view discarded products.
- Messaging Dashboard providing information and actions for users.
- Flexible reporting facility enables users to create and save reports.
- Full audit trail for individual stock items.
- Allows tracking of high value items from delivery to issue.
- Handheld devices for all stock item processes.
- Enables sites to have control of consumable items in stock.
- Ensures accurate stock level control.
- Saves money by optimising the ordering process.
- User permission levels can control access to data/processes.
- Cloud-based system – with you in control.
- GS1 standard compliant labels.
- Multi-site compatible.
£200.00 to £2500.00 per licence per month
|Service constraints||There are no service constraints.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
9.00 am - 5.00 pm Monday to Friday
Excludes weekends and Bank Holidays
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
There are 2 support levels:
1. Basic support providing telephone and email support Monday to Friday between the hours 9.00 am and 5.00 pm. This is included in the licence price.
2. Enhanced support to cover other hours as required. Costs can be provided on application. All clients have a technical account manager who they can contact during working hours.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||A training course is provided for the service as well as user documentation. Training can be carried out on-site or online. Assistance is provided with a data load and initial implementation.|
|End-of-contract data extraction||Data can be extracted into an Excel spreadsheet. All PDF documents can be extracts as PDF's.|
|End-of-contract process||There will be no additional costs at the end of the contract unless the client specifically requests for data to be extracted into a specific format.|
Using the service
|Web browser interface||Yes|
|Using the web interface||Savant will set user permissions and access as required.|
|Web interface accessibility standard||None or don’t know|
|How the web interface is accessible||Uncluttered layout with a good contrast of colours. Font size set to ensure text is easy to read. There are intuitive menus appropriate to process. The service is browser based so accessibility extensions within browsers can be used.|
|Web interface accessibility testing||No testing has been carried out with users of assistive technology.|
|Command line interface||No|
|Independence of resources||We continually monitor the database sizes and the overall processing load on our servers and expand requirements to ensure no degradation in service. Our servers are specified to ensure they will maintain service with the maximum number of users permitted by the client licences.|
|Infrastructure or application metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||No|
|Equipment disposal approach||A third-party destruction service|
Backup and recovery
|Backup and recovery||Yes|
|What’s backed up||
|Backup controls||Back-ups are carried out automatically.|
|Datacentre setup||Single datacentre with multiple copies|
|Scheduling backups||Supplier controls the whole backup schedule|
|Backup recovery||Users contact the support team|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||SSC can be hosted either on-site or on a virtual server by Melbourne Server Support, part of the IOMART Group. IOMART give 99.95% Service Level Agreement (SLA) for network connectivity. This means that the client's server will be accessible via the internet for 99.95% of the time, which equates to a maximum of 4.38 hours downtime per year.|
|Approach to resilience||Savant Ltd uses a number of data-centres to support its services. We ensure a high level of resilience as a priority. We will discuss and agree with a client the most appropriate data-centre to meet their needs.|
|Outage reporting||Savant Ltd will contact our customers directly by phone or email in the event of any outages.|
Identity and authentication
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||ISO:27001 and ISO:9001. Carrying out staff training.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
|Devices users manage the service through||Directly from any device which may also be used for normal business (for example web browsing or viewing external email)|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||Lloyds Register LRQA|
|ISO/IEC 27001 accreditation date||29/01/18|
|What the ISO/IEC 27001 doesn’t cover||No aspect of the service is not covered by our ISO/IEC 27001 certification or the ISO/IEC 27001 of our hosting provider.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
The Improvements Manager reports to the Managing Director and is responsible for ensuring our Information Security policies are adhered to. Savant Ltd has an Information Security Procedure, which must be followed by all staff.
The Procedure covers identifying interested parties and defining their interest, identifying information assets and categorising them, grouping information assets into information classes, identifying asset owners and assessing the class value. Risk are identified against each information asset, risks are linked to the ISMS controls; the likelihood of the risk occurring and the asses class risk of compromise are identified and the risk acceptance criteria assessed.
Treatment Plans are defined by an asset class, the procedure for the execution of the treatment plan is defined and the procedures for re-assessing the risk score are documented. Regular internal audits ensure that the procedures are followed. Staff are encouraged to promptly report any suspected security breaches.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||All services are subject to Savants configuration and change management procedures. Each service has a specific procedure defining the steps to be taken to release a new version. These procedures cover requirement specifications for all proposed changes, test scripts for all proposed changes, testing procedures to include regression testing, release schedule, customer liaison and the production and issue of release notes. All bugs are recorded in our TestTrack system from initially being reported through to the update of the software and release to the customer.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Savant continually assess vulnerabilities to ensure that our hosting services provide the highest levels of vulnerability management. We maintain awareness of vulnerabilities that might affect our software services and regularly test/audit our software services to ensure any potential vulnerabilities are identified and corrected promptly.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Savant carries out daily checks on its server to identify any potential compromises. We also have email alerts set up to notify staff of any compromises. In the event of a potential compromise being identified we will immediately lock-down the server affected and inform any affected customers. We aim to respond to any such incidents as quickly as possible and in any event within one hour during normal working hours. Outside of normal working hours, our hosting provider would take action on our behalf.|
|Incident management type||Supplier-defined controls|
|Incident management approach||Savant has a Business Continuity Plan that identifies our critical services and the actions to be taken in the event of an incident. Savant uses a hosted Business Continuity software service to store and maintain its Business Continuity data and plans. Processors are defined to be followed in the event of a specific incident. There is a defined process for users to report incidents using the business continuity software enabling text messages to be sent to the Incident Management Team. All details of an incident are recorded and an Incident Management report produced by the software recording all actions taken.|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Separation between users
|Virtualisation technology used to keep applications and users sharing the same infrastructure apart||No|
|Price||£200.00 to £2500.00 per licence per month|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|