CHC software
My Care Bank is a cloud-based solution that enables effective management of individualised care, specifically Continuing Healthcare (CHC) and Funded Nursing Care (FNC).
Features
- Market Management
- Structured and efficient invoicing and purchasing
- Patient case notes
- Activity and finance monitoring and reporting
Benefits
- Allows effective management of patients through the pathway
- Simplifies reporting to NHS England
- Invoices can be validated online
- Reduction in transactional staffing levels
- The product enables supplier markets to be managed effectively
- Purchases, contracts and correspondence are captured in one location
- Ensures all clinical and critical information is captured
Pricing
£1,500 a user a year
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at Info@carebanking.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 10
Service ID
7 4 5 9 3 8 8 5 4 5 5 2 7 3 4
Contact
Care Banking
Sales
Telephone: 0203 633 1766
Email: Info@carebanking.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Existing clinical or assessment systems, invoicing, contracting and payment systems.
- Cloud deployment model
- Private cloud
- Service constraints
- Support is not provided for early versions of internet browsers. Please contact us for more details
- System requirements
-
- No specific system requirements
- Recent browsers are required for secure operation.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support is not provided at weekends.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Bug resolution is included in the costs.
We utilise account managers. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Online training is provided.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- An export from the database is provided on request.
- End-of-contract process
- A single extract from the database is included in the costs. Any additional work will be billed to the customer.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Safari 9+
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Only screen formatting is different.
- Accessibility standards
- WCAG 2.0 A
- Accessibility testing
- Pilot of the service, specifically including user interface testing.
- API
- Yes
- What users can and can't do using the API
- The API is for transferring clinical data between systems
- API documentation
- No
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- The architecture ensure scaling does not cause performance issues for users. More information can be made available to potential users if required.
Analytics
- Service usage metrics
- Yes
- Metrics types
- User tracking, expenditure, customers can also request specific usage metrics at the time of ordering.
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Csv file
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
The defined Service level is 90 % during core hours, core hours are considered to be 9 to 5 weekdays. Service maintenance and system updates are scheduled outside of core hours. Any planned downtime (i.e. for maintenance) will be conducted outside of core service hours and the service must be provided with a minimum of 48 hours’ notice.
Where system maintenance is urgently required, the policy is to switch to the backup facility, users will be provided with as much information as possible should this occur. - Approach to resilience
- Available on request
- Outage reporting
- Email alerts are reported to all registered users
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Access restrictions in management interfaces and support channels
-
The design of the My Care Bank solution ensures that the systems and software supplied enable personal information to be handled legally, securely, efficiently and effectively in order to deliver the best possible care. The system components used singularly or in combination, meet or exceed the current minimum requirements.
Privacy and data protection has been built into the system architecture from the start, the underlying design relies on three databases; two cloud based and an independent local database application, accessed through a role based protocol. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials Plus
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- We comply with the NHS standards for the Information Governance toolkit.
- Information security policies and processes
- All information security is monitored by a information governance steering group.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We run automated test routines on all releases in a reproduction environment, before undertaking limited user testing.
A formal group approves all updates and monitors bug fixes on live sites. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Automated monitoring systems track threats and inform the head of security and the deputy head of security.
Patches can be deployed immediately if required. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Automated systems track all users and alert system security of any inappropriate or suspicious activity.
Pre-release testing identifies areas of weakness that are addressed in the preproduction environment. - Incident management type
- Supplier-defined controls
- Incident management approach
- All incidents are reported to the information governance steering group,this group maintains and updates the policies for managing all incidents.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- New NHS Network (N3)
Pricing
- Price
- £1,500 a user a year
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at Info@carebanking.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.