EMIS Ltd

Concentric - digital consent

Concentric is a digital consent and shared decision making web application which transforms the paper process of giving consent for treatment.

Personalised information, supported by evidence-based, treatment-specific information supports consent conversations and drives informed, shared decisions. Patients can access consent information and can document consent remotely or with their clinician.

Features

  • Digital consent for treatment
  • Remote consent functionality with secure patient access
  • Evidence-based & SNOMED-CT coded clinical content across 1000+ treatments
  • Personalised information for each individual
  • Electronic Health Record integration for demographics, documents & authentication
  • Device agnostic, web-based, cloud hosted

Benefits

  • Remote consent without requiring physical outpatient consultations
  • Reduce medicolegal risk by reducing errors and ensuring appropriate documentation
  • Reduce inappropriate clinical variation with trusted information supporting decision-making
  • Support patient understanding, providing accessible information tailored to them
  • Reduce the use of paper within the consent process
  • Improve operational efficiency - reduce cancellations and delays
  • Administration interface to manage users, review usage and feedback
  • Audit trail of all user actions

Pricing

£25,000 a licence a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bids@emishealth.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

6 6 8 7 0 9 6 1 1 3 9 9 1 4 8

Contact

EMIS Ltd Bid Team
Telephone: 0113 380 3000
Email: bids@emishealth.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Planned maintenance will be notified in advance.
System requirements
Modern web browser with javascript and cookies enabled

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response time for acknowledgement of a new Incident is immediate

Resolution times vary based upon severity, which are set at Severities 1 (very high) to 5 (very low).
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
No
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
We use ServiceNow for our support platform. The assistive technologies JAWS, NVDA, and VoiceOver are used to test ServiceNow products.
Onsite support
No
Support levels
Support cases are prioritised as severity 1 to severity 5 (provided to the Customer)

Support documentation is available on our support system, EMISNow, and is available to the Customer or third parties authorised by the Customer.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Online training and user documentation
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Data is provided to the user at the end of the contract via PDF exports of each consent form accompanied with metadata for each episode.
End-of-contract process
There is no additional fee for a standard data extract. Where required, other extracts are chargeable at commercial rates.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
All functionality is available across mobile and desktop with responsive web design.
Service interface
Yes
Description of service interface
Web based front-end
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
1. Routine audit of compliance with WCAG standards
2. Service evaluations undertaken within NHS organisations including accessibility assessment.
API
No
Customisation available
Yes
Description of customisation
Through administration and management interfaces, the following areas can be customised by or on behalf of the buyer:

1. Healthcare organisation's branding
2. Clinical content modifications to meet local requirements
3. Domain name

Scaling

Independence of resources
Monitoring data is collected for early warning of increased demand and the system is designed to scale horizontally. The system operates with significant headroom and demand for this service in inherently predictable.

Analytics

Service usage metrics
Yes
Metrics types
Consent episodes completed, number of active clinicians, patient access to information. Metrics can be explored by specialty and timeframe.
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Concentric Health

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Consent form PDF's can be downloaded by users from within the application. Episode data can be requested, and provided as PDF documents with accompanying metadata.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9%
Approach to resilience
Automatic failover configured to handle all server failure, which is designed to cause less than 5 minutes of unavailability. System is designed to not need any scheduled maintenance. Zero downtime deployments of new application code. Designed to be resilient to a single datacenter failure within a region.

Data recovery processes are in place, in the unlikely event of total system failure:
- Database backups can be used in the case of total system failure. This scenario is not anticipated and would be a manual operation taken as a last resort.
- Configuration management system is used to configure all cloud services and hosts, allowing rapid total replacement of cloud infrastructure in the case of total failure.

Database backups are taken daily and stored for 7 days.
Outage reporting
Periodic monitoring of the system results in automatic notification to a human in the case of over 5 minutes of system unavailability. Tenants are provided a company operational and technical contact for use in an emergency, with emergency support available 24/7.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Role-based administration access to administration interface, with 2-factor authentication.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
13/04/2018
What the ISO/IEC 27001 doesn’t cover
The Information Security Management in relation to the provision and subsequent support of information and management systems to healthcare and non healthcare professionals. Information Security Management within the supply and deployment of ICT infrastructure and support services. Both in accordance with the Statement of Applicability version 21 dated 13/04/2018.

The sub contractor, Concentric Health, is not covered by this certification.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials Plus

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials Plus. NHS Digital Data Security and Protection Toolkit.
Information security policies and processes
Healthcare professional access: Best practice for password creation and management are enforced, as per Cyber Essentials recommendations.

Patient access: Patients receive an unguessable URL (generated using a secure random generator with in excess of 10 quadrillion possible combinations) via their email address. The email contains no special category data. When patients access this link within the email, they need to enter their date of birth before a consent record may be viewed. In order to ensure that the URL and consent details are kept secure: the URL will be limited to TLS connections, browsers and intermediaries will be prevented from caching, and outbound links will not reveal the full referrer URL.

A security incident reporting procedure is in place, alongside confidentiality and data protection, and data security incident monitoring. Incidents are reported to the Chief Technical Officer.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Release notes are made available to each customer at each release. Unit testing and both manual and automatic end-to-end testing is undertaken at each release. Clinical safety and security impacts are considered as part of any release to ensure ongoing compliance with NHS Digital DSPT and Cyber Essentials Plus standards.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Systems run with up to date dependencies. LTS operating system releases used with automatic updates enabled. We subscribe to automatic security vulnerability alerts for all our code dependencies, which are sent to designated individuals. Our policy is to deploy updated dependency versions within 2 weeks, or sooner if deemed necessary by our CTO.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Log data is collected centrally and monitored for signs of unusual activity.

Application logging is carefully designed so that unusual activity is logged at warn level or above. The rate of such logs is monitored to provide an early warning signal.

Internally services are designed along zero-trust principles. This prevents a single compromised component from allowing access to other information.

Internal authentication is by way of signed authentication tokens. The private keys underlying these tokens can be replaced in case of a suspected breach which will invalidate all existing tokens and cause all users to become immediately logged out.
Incident management type
Supplier-defined controls
Incident management approach
Periodic monitoring of the system results in automatic notification to a human in the case of over 5 minutes of system unavailability.
Tenants are provided a company operational and technical contact for use in an emergency, with emergency support available 24/7. Root cause analysis investigations are undertaken in response to failure.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£25,000 a licence a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Potential options available on request.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bids@emishealth.com. Tell them what format you need. It will help if you say what assistive technology you use.