Linea Group Ltd

e-resourcing / e-rostering software

A bespoke software solution that works as a communication platform connecting clinical staff with hospital managers who manage rosters/ off duty's.

Features

  • Real-time reporting
  • App accessed
  • Online software

Benefits

  • Cost Saving
  • Bespoke
  • Intelligent communication platform

Pricing

£27.50 per user per month

Service documents

Framework

G-Cloud 11

Service ID

5 8 8 0 3 7 3 4 1 4 2 5 3 2 9

Contact

Linea Group Ltd

Claire Schneider-Williams

07950130067

claire.schneider@lineagroup.net

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
None
System requirements
  • Internet access
  • Google Chrome optimised

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 24 hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
Hands on technical support and cloud based support
Support available to third parties
No

Onboarding and offboarding

Getting started
Onsite training and online assistance is provided
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
N/A
End-of-contract process
N/A

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Chrome
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
N/A
Service interface
No
API
Yes
What users can and can't do using the API
Engaging with temporary staff made easy. Clinical staff download our free to use app (available on both Android and IOS) They can then: List their availability. Accept open shifts. Upload their documents. Clock in and clock out as and when they show up for and leave work.
API documentation
No
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
The support provided is specific to the client and totally independent of other clients, thereby guaranteeing that all clients receive the required service, support and user experience.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
All data is exported from the system by Linea and presented to the client. This service is provided as part of the annual subscription service. The information is extracted, saved in a secure and safe location and passed over to the client.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • Word
Data import formats
  • CSV
  • Other

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • Bonded fibre optic connections
Data protection within supplier network
Other
Other protection within supplier network
Staff and clients are regularly trained in data protection and advised how to ensure data integrity. Passwords are regularly required to be updated. New starters need to have completed system overview course before being issued with a password and Login and passwords are deleted immediately upon leaving an organisation. Our customer service team also regularly review suspicious activity and failed login attempts.

Availability and resilience

Guaranteed availability
Support is consistently assessed against specific SLA's. Support is provided to clients in line with the agreed system requirements and clients extras as part of the programme. Any issues regarding this process will can be escalated to the account manager who will take the appropriate action to ensure SLA achievement and compensate the client in situation where this is deemed appropriate and necessary.
Approach to resilience
Available on Request
Outage reporting
Dashboard, supported by email and SMS alerts.

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
Access to management interfaces and support channels are restricted through individual delegation, supported by accessibility passwords, which are carefully control and regularly reviewed and updated.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Employees are CRB complaint. All data and systems are security complaint and encrypted. All processes are ISO compliant. Staff undergo regular security training.
Information security policies and processes
Our reporting structure is dependent upon the type and complexity of the programme, however a typical structure comprises: Programme Director - working in partnership with the client SRO Programme Manager Programme Team - comprising various skills sets, experience and hierarchical levels. We ensure policy adherence through adoption and management of robust ISO procedures

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Change Acceptance Process (CAP) Sustainable programme success is dependent upon our ability to go beyond training clients in new skills sets & develop people as change agents. We utilise CAP to develop change culture. CAP is a 9 step process to manage change. It’s fundamental in embedding change in the culture of organisations: 1. Set-up for success 2. Clarify the vision 3. Clarify the need 4. Evaluate potential resistance 5. Communicate & convince 6. Delivery early benefits 7. Remove obstacles 8. Embed in the organisation 9. Embed in the Culture.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Five phase process: 1.) Preparation Understanding: Size, scope, and geographic dispersion of infrastructure, Number of applications and devices on the network at all times. Critical assets (financial data & sensitive information). 2.) Discovery Low-risk assets are scanned at least quarterly. High risk assets are scanned daily. Patches are released in line with this schedule. 3.) Analysis We analyse and review high value information that each scan yields. 4.) Reporting Reports, focus on threat analysis, SLA status, compliance, and exceptions are reviewed to assess the required actions. 5.) Remediation This is undertaken both remotely and locally, with the benefit of contingencies.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our service includes: Comprehensive monitoring & alerting. We collect log data on the activities of users, and review/audit it. Coupled with intelligent baselining & effective prioritisation, enabling critical alerts to be raised to the right people at the right time. Knowledgeable analysts. understand and remediate possible attacks and incidents. Deciphering the information generated through monitoring. We provide regular reports/reviews to ensure the service continues to deliver at expected levels. This means no issues are missed, and alerts can be analysed/understood after the event. Our flexible process isn't tied to specific design so the service can evolve based changes to GPG13.
Incident management type
Supplier-defined controls
Incident management approach
Security incidents are inevitable and they will vary in their business impact. All incidents need to be effectively managed, particularly those that invoke the organisation’s disaster recovery and business continuity plans. How risk are managed? Obtain senior management approval and backing. Establish an incident response capability. Provide specialist training Define the required roles and responsibilities Establish a data recovery capability Test the incident management plans Decide what information will be shared and with whom Collect and analyse post-incident evidence Conduct a lessons learned review Educate users and maintain their awareness Report criminal incidents to Law Enforcement.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£27.50 per user per month
Discount for educational organisations
No
Free trial available
No

Service documents

Return to top ↑