This G-Cloud 8 service is no longer available to buy.

The G-Cloud 8 framework expired on Friday 28 July 2017. Any existing contracts with INHEALTH INTELLIGENCE LIMITED are still valid.
INHEALTH INTELLIGENCE LIMITED

Risk Stratification, Case Finding & Interventions Management Tool

Our Risk Stratification & Case Finding tool will help you deliver a cost-effective service by identifying very high risk patients who will benefit the most from an immediate and early intervention. These very high risk patients are people who are likely to be high service hospital users in the future.

Features

  • Fully managed service using secure N3 based web browser
  • Supports all the different primary care clinical systems
  • Supports multiple risk algorithms
  • Risk profiling in support of the “frail elderly”
  • Case-finds and refers patients to appropriate early interventions

Benefits

  • Pro-active disease management
  • Population level solutions to transform the care of patients
  • Supports GPs in payment processes e.g. Unplanned Admissions DES

Pricing

£1,500 a unit a year

  • Minimum contract period: Year
  • Excluding VAT
  • Trial option available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at alexandra.richardson@health-intelligence.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 8

Service ID

8 4 8 8 4 4 1 5 5 6 4 6 1 5 1

Contact

INHEALTH INTELLIGENCE LIMITED Alex Richardson
Telephone: 01270 765124
Email: alexandra.richardson@health-intelligence.com

Support

Support service type
  • Service desk
  • Email
  • Phone
  • Onsite
Support accessible to any third-party suppliers
No
Support availability
Monday - Friday 9am - 5pm
Standard support response times
1 business hour
Incident escalation process available
Yes

Open standards

Open standards supported and documented
Yes

Onboarding and offboarding

Service onboarding process included
No
Service offboarding process included
No

Analytics

Real-time management information available
No

Cloud features

Elastic cloud approach supported
Yes
Guaranteed resources defined
Yes
Persistent storage supported
Yes

Provisioning

Self-service provisioning supported
No
Service provisioning time
14 working days
Service deprovisioning time
To be agreed on contract

Open source

Open-source software used and supported
Yes

Code libraries

Languages your code libraries are written in
  • Java
  • PHP

API access

API access available and supported
No

Networks and connectivity

Networks the service is directly connected to
New NHS Network (N3)

Access

Supported web browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Firefox
  • Chrome
  • Safari
  • Opera
Offline working and syncing supported
No
Supported devices
  • PC
  • Mac
  • Tablet

Data storage

Datacentres adhere to the EU code of conduct for energy-efficient datacentres
Yes
User-defined data location
Yes
Datacentre tier
TIA-942 Tier 2
Backup, disaster recovery and resilience plan in place
Yes
Data extraction/removal plan in place
Yes

Data-in-transit protection

Data protection between user device and service

Asset protection and resilience

Datacentre location
Data management location
Legal jurisdiction of service provider
UK
Datacentre protection
Yes
Data-at-rest protection
Secure data deletion
Other secure erasure process
Service availability
99%

Separation between consumers

Cloud deployment model
Private cloud
Type of consumer
Only government consumers
Services separation
Yes
Services management separation
Yes

Governance

Governance framework
Yes

Configuration and change management

Change impact assessment
Yes

Vulnerability management

Vulnerability assessment
Yes
Vulnerability monitoring
Yes
Vulnerability mitigation prioritisation
Yes
Vulnerability tracking
Yes
Vulnerability mitigation timescales
Yes

Event monitoring

Event monitoring
Yes

Incident management

Incident management processes
Yes
Consumer reporting of security incidents
Yes
Security incident definition published
Yes

Personnel security

Personnel security checks

Secure development

Secure development
Yes
Secure design, coding, testing and deployment
Yes
Software configuration management
Yes

Supply-chain security

Visibility of data shared with third-party suppliers
Yes
Third-party supplier security requirements
Yes
Third-party supplier risk assessment
Yes
Third-party supplier compliance monitoring
Yes

Authentication of consumers

User authentication and access management
Yes
User access control through support channels
Yes

Separation and access control within management interfaces

User access control within management interfaces
Yes
Administrator permissions
Yes

Identity and authentication

Identity and authentication controls

Secure service administration

Service management model

Audit information provision to consumers

Audit information provided
Data made available

Secure use of the service by the customer

Device access method
Training
Yes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at alexandra.richardson@health-intelligence.com. Tell them what format you need. It will help if you say what assistive technology you use.