T-Impact Limited

RPA Care in the community Robot

Automatically process social worker requests for home bound citizen benefits such as nursing care, transport & day care. Filter out duplicates, validate requests & process updates across multiple IT systems. Confirm supervising authority, apportion costs & prepares recipient letter(s). The Robot also works in reverse, removing benefits once approved.

Features

  • Automated work flow for UiPath unattended Robot
  • Includes 12 mo UiPath unattended Robot license
  • 24 days configuration to implement your care-in-the-community process
  • Includes 12 months support
  • Includes configuration to implement with your IT systems
  • Automates work to process social work requests
  • Enforces standard process across your IT systems
  • Works with UI Path Orchestrator
  • Scalable solutions that supports parallel processing

Benefits

  • Enforces standardised process, eliminating risk of discrimination
  • Improve compliance reporting, audit every transaction
  • Quickly respond to new central government guidance and regulation
  • Ensure service provision data consistency across all IT systems
  • Reduce customer complaints with improved customer data accuracy
  • Free staff to improve services and support customers
  • Reduce costs, 90% cheaper than UK support staff
  • Improve staff morale, freeing them from tedious data entry work
  • Automate with Latest technology rather than using temporary labour
  • Reduce costs, ensuring all support requests are validated consistently

Pricing

£56508 per unit per year

Service documents

Framework

G-Cloud 11

Service ID

7 3 2 2 4 9 0 8 9 1 2 7 4 3 9

Contact

T-Impact Limited

Trevor Cole

01865 818952

trevor.cole@t-impact.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
This robot solution is built using the latest Robotic Process Automation (RPA) from UI Path . The licenses subscriptions are incorporated into the solution costing and can used for additional robot workflows.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Solution does not include infrastructure. Cloud infrastructure can be provided separately.
Configuration requires separate development and testing environments
System requirements
Infrastructure to support UiPath unattended robot (cloud or on-premise)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Standard support is provided Monday to Friday from 9 Am to 5 PM for BST, excluding UK Bank Holidays. Responses are normally provided by email. Response times are:
Severity 1 = 1 Hour
Severity 2 = 2 Hours
Severity 3 = 1 Business day

Premium support is provided Monday to Saturday from 9 AM to 6 PM BST, excluding UK Bank Holidays. Responses are normally provided by email. Sunday and extended hours support are available for an extra charge, where required. Response times are:
Severity 1 = 1 Hour
Severity 2 = 2 Hours
Severity 3 = 4 Hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
Web chat available from July, 2019. We use Jira support tools, who state: We test our software using a variety of screen readers and browsers. We've found the following combinations provide the most accessible experience when using our products: If you're using Windows, we recommend using NVDA with Firefox. If you're using OSX, we recommend using VoiceOver with Safari.b chat is provided
Onsite support
Yes, at extra cost
Support levels
Support level "Standard", response times:
Severity 1 = 1 Hour
Severity 2 = 2 Hours
Severity 3 = 1 Business day

Support level "Premium", response times:
Severity 1 = 1 Hour
Severity 2 = 2 Hours
Severity 3 = 4 Hours

Standard support is included with T-impact's support contracts. Premium support is charged at £200 per month per process.

Technical account manager is provided
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Service includes 1 training class. Additional training available separately
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
All data will be stored in your existing IT systems and is therefore immediately available at end of contract
End-of-contract process
At the end of contract, a renewal option will be offered. If you decide not to renew the contract, then the system access will stop.

Your existing IT systems will continue to operate without the solution, your staff can revert to the manual on-boarding procedures used before this solution was implemented.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices
No
Service interface
No
API
No
Customisation available
Yes
Description of customisation
This service includes customisation support to ensure compatibility with your process and IT systems

Scaling

Independence of resources
The architecture of Microsoft Azure cloud services maintains logical separation of client data. Internal rules and measures separate data processing, such as inserting, modifying, deleting, and transferring data, according to the contracted purposes.

In essence your existing CRM and or Case Management Systems are the matter of record and their performance should not be adversely affected by the automation. However as Robotic processes are 20 times faster than a human, some load balancing might be required to run processes when users are less likely to be on the system to ensure maximum performance.

Analytics

Service usage metrics
Yes
Metrics types
All service usage log files can be interrogated. Service availability reports available upon request. Additional service metrics can be customised, provided separately
Reporting types
Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
UiPath, Microsoft, IBM and Bonitasoft

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The platform does not store any user data so there is no need to export.
Data export formats
Other
Other data export formats
No data retained within platform.
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Legacy (mainframe, terminal screen, etc.)
  • Microsoft Office (Word, Excel, Outlook, Access)
  • IT systems from Capita, Northgate and others
  • Native PDF documents
  • OCR'd documents and forms
  • Images (JPEG, GIF, PNG, etc.)
  • Web (any HTML including frames and multiple screens)
  • Chatbot (Google and Microsoft cognitive services)

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The UiPath platform is operational 24/7/365. Our Cloud provides 99.999% availability.
Approach to resilience
This automated workflow solution can be deployed on multiple UiPath unattended robots for resilience and disaster recovery. Solution can be deployed on highly resilient cloud infrastructure or on your on-premise infrastructure.
Outage reporting
This solution automatically logs service outages on the T-Impact Jira support desk. Service outages are available on the Jira public dashboard or can be configured to send email alerts. Additional service outage reporting are available separately, including updates to other dashboards, API, text alerts or emailing lists.

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
User name and password control over access to uipath products.

This can be achieved via AD or other auth mechanisms.
Access restriction testing frequency
At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
AEROQ
ISO/IEC 27001 accreditation date
30/08/2017
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber security essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
CSA CCM version 3.0
Information security policies and processes
UiPath Systems, Networks and processes are reviewed annually by the Information Security Office to ensure compliance with security policies and standards. Additionally, this review is subject to audit by the Internal Audit and External Audit.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Configuration & Change management is handled via Hipbath Maintenance and support agreement.

UiPath will track the UiPath RPA product components and will ensure changes are handled via a documented & agreed procedure.

From a RPA Solution perspective our change management and robot configuration is in line with the Industry Standards for Source and version control. We will work with our public customers to create the necessary Dev, Test, UAT and Live environments.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
UiPath implements all applicable security requirements reasonably needed for the protection of confidential data processed through UiPath systems while still continuing to operate its businesses effectively and efficiently.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
UiPath uses internal resources & external vendors to run assessment of potential risks & vulnerabilities.

If a risk or vulnerabilities is identified we have a internal procedure that handle them based on impact/ priority.

incidents are handled based on priority, starting from 4hrs response.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
UiPath provide incident management via support portal for its customers.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£56508 per unit per year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
A community edition of RPA software is available that's limited to non-commercial use.
Link to free trial
https://www.uipath.com/community

Service documents

Return to top ↑