Risk Stratification, Case Finding & Interventions Management Tool
Our Risk Stratification & Case Finding tool will help you deliver a cost-effective service by identifying very high risk patients who will benefit the most from an immediate and early intervention. These very high risk patients are people who are likely to be high service hospital users in the future.
Features
- Fully managed service using secure N3 based web browser
- Supports all the different primary care clinical systems
- Supports multiple risk algorithms
- Risk profiling in support of the “frail elderly”
- Case-finds and refers patients to appropriate early interventions
Benefits
- Pro-active disease management
- Population level solutions to transform the care of patients
- Supports GPs in payment processes e.g. Unplanned Admissions DES
Pricing
£1,500 a unit a year
- Minimum contract period: Year
- Excluding VAT
- Trial option available
Service documents
Request an accessible format
Framework
G-Cloud 8
Service ID
8 4 8 8 4 4 1 5 5 6 4 6 1 5 1
Contact
INHEALTH INTELLIGENCE LIMITED
Alex Richardson
Telephone: 01270 765124
Email: alexandra.richardson@health-intelligence.com
Support
- Support service type
-
- Service desk
- Phone
- Onsite
- Support accessible to any third-party suppliers
- No
- Support availability
- Monday - Friday 9am - 5pm
- Standard support response times
- 1 business hour
- Incident escalation process available
- Yes
Open standards
- Open standards supported and documented
- Yes
Onboarding and offboarding
- Service onboarding process included
- No
- Service offboarding process included
- No
Analytics
- Real-time management information available
- No
Cloud features
- Elastic cloud approach supported
- Yes
- Guaranteed resources defined
- Yes
- Persistent storage supported
- Yes
Provisioning
- Self-service provisioning supported
- No
- Service provisioning time
- 14 working days
- Service deprovisioning time
- To be agreed on contract
Open source
- Open-source software used and supported
- Yes
Code libraries
- Languages your code libraries are written in
-
- Java
- PHP
API access
- API access available and supported
- No
Networks and connectivity
- Networks the service is directly connected to
- New NHS Network (N3)
Access
- Supported web browsers
-
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10+
- Firefox
- Chrome
- Safari
- Opera
- Offline working and syncing supported
- No
- Supported devices
-
- PC
- Mac
- Tablet
Data storage
- Datacentres adhere to the EU code of conduct for energy-efficient datacentres
- Yes
- User-defined data location
- Yes
- Datacentre tier
- TIA-942 Tier 2
- Backup, disaster recovery and resilience plan in place
- Yes
- Data extraction/removal plan in place
- Yes
Data-in-transit protection
- Data protection between user device and service
Asset protection and resilience
- Datacentre location
- Data management location
- Legal jurisdiction of service provider
- UK
- Datacentre protection
- Yes
- Data-at-rest protection
- Secure data deletion
- Other secure erasure process
- Service availability
- 99%
Separation between consumers
- Cloud deployment model
- Private cloud
- Type of consumer
- Only government consumers
- Services separation
- Yes
- Services management separation
- Yes
Governance
- Governance framework
- Yes
Configuration and change management
- Change impact assessment
- Yes
Vulnerability management
- Vulnerability assessment
- Yes
- Vulnerability monitoring
- Yes
- Vulnerability mitigation prioritisation
- Yes
- Vulnerability tracking
- Yes
- Vulnerability mitigation timescales
- Yes
Event monitoring
- Event monitoring
- Yes
Incident management
- Incident management processes
- Yes
- Consumer reporting of security incidents
- Yes
- Security incident definition published
- Yes
Personnel security
- Personnel security checks
Secure development
- Secure development
- Yes
- Secure design, coding, testing and deployment
- Yes
- Software configuration management
- Yes
Supply-chain security
- Visibility of data shared with third-party suppliers
- Yes
- Third-party supplier security requirements
- Yes
- Third-party supplier risk assessment
- Yes
- Third-party supplier compliance monitoring
- Yes
Authentication of consumers
- User authentication and access management
- Yes
- User access control through support channels
- Yes
Separation and access control within management interfaces
- User access control within management interfaces
- Yes
- Administrator permissions
- Yes
Identity and authentication
- Identity and authentication controls
Secure service administration
- Service management model
Audit information provision to consumers
- Audit information provided
- Data made available
Secure use of the service by the customer
- Device access method
- Training
- Yes