MEG Support Tools

MEG Support Tools

MEG Support Tools is a flexible Quality Improvement and Patient Safety solution for acute care facilities, delivering streamlined regulatory and accreditation compliance across hospital departments. A suite of powerful mobile tools provides capabilities including paperless inspections & auditing, action plans, task delegation, incident reporting, document management, and real-time report generation.


  • Go paper-free; capture inspection data and complete audits digitally
  • Create action plans, delegate and track tasks, set trigger alerts
  • Report incidents in real-time, quickly and accurately
  • Customisable management reports to bring your data to life
  • Generate real-time reports and drill-down for deeper insights
  • Make your data meaningful with insightful, appealing dashboard and reports
  • Set up trigger alerts for deviations from performance benchmarks
  • Compare performance between different hospital areas
  • Customisable by client for different audits, question sets, answers


  • Enjoy paperless workflows, typically halving inspection and audit times
  • Understand performance across hospital(s), department or ward
  • Quickly identify issues and areas of poor performance using heatmaps
  • Produce appealing, insightful and sharable reports in minutes
  • Get a quick snapshot of compliance across your hospital
  • Gain clarity and assurance with performance tracking and audit trails
  • Work flexibly using mobile or desktop devices, online or offline
  • Improve staff engagement and accountability with the easy-to-use mobile app


£10 per unit per year

Service documents


G-Cloud 11

Service ID

8 6 9 3 9 4 5 6 0 4 9 1 4 5 5


MEG Support Tools

Kerrill Thornhill

020 3322 5406

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints We aim to support latest versions of popular browsers and we're backwards compatible with older versions of browser and operating systems multiple versions behind.
The app requires Internet access to log in and upload data, but can be used offline during inspection.
If data collection using a mobile device is required, MEG is compatible with iOS and Android OS, multiple versions behind.
System requirements
  • Recent version of a supported web browser
  • Internet Access
  • Software license required to use

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We aim to respond to clients within 4 working hours for High Level support issue, within 24 hours for Normal Level support issue during weekdays.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Online, email and phone support are included within the software licence fee. On-site support will be provided at a cost of £900 per day excluding VAT.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Users will be provided with all the material needed to get started with the application: User guides, support documentation, how-to videos.

Onsite training is provided for customers who require a supported implementation, along with set-up support. All of this can be tailored to a specific client's needs.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction MEG will provide the client with its data in an electronic csv or Excel format for compatibility with future systems.
End-of-contract process At the end of a contract, MEG will archive or delete the data as per client's request.
If required, MEG will supply the client with its inspection data in electronic csv or Excel format for compatibility with future systems.
All users' access to MEG will be revoked.

If historical data is required in a tailored format, MEG can supply this to the client at an additional cost.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Windows
  • Windows Phone
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Mobile-optimized page layout is used on mobile devices, but features remain the same as on desktop version.
Service interface Yes
Description of service interface Our web portal allows users with sufficient privileges to view reports, review submitted data and manage the hospital's resources (users, wards, rooms etc.)
Accessibility standards None or don’t know
Description of accessibility No limitation for users using accessibility technologies.
Accessibility testing We've tested the system using text scaling option.
Text scaling feature is built into the mobile app.
What users can and can't do using the API API can be used to access hospital's resources such as ward structure, audit forms and raw audit data.
API can be used to submit audit data.
Other features are available on request.
API documentation Yes
API documentation formats
  • HTML
  • PDF
  • Other
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The following can be configured by the client from user dashboard (with specific user credentials):
1. Setting and updating of users passwords.
2. Granting access to auditors to new audits.
3. Setting up and changing of custom audits: editing questions and answers, compliance calculation of question, help text, supporting graphic, order of questions, order of question categories / sections, making questions required/not required, etc.
4. Setting up and changing of sites, directorates, wards, auditor teams, etc.
5. Customisation of audit schedules.
6. Excel download of data can be customised by fields required.

The following can be configured by MEG:
1. Customisable graphs and reports to clients needs.
2. RAG scores per audit.
3. Customisation of QIP (Quality Improvement Plan) dashboard layout.
4. Add signature required to specific audit forms.


Independence of resources We have a strategy in place to ensure that users are not affected by increased demand and we monitor our servers continuously. We also monitor our service levels to ensure sufficient support staff are available to meet customers' needs.


Service usage metrics Yes
Metrics types Users can view metrics of inspection usage through the Web Portal dashboard.
Reporting types Real-time dashboards


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency Never
Protecting data at rest
  • Physical access control, complying with another standard
  • Other
Other data at rest protection approach Private key authentication is required to access servers over ssh
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can export their audit data to pdf, Excel, csv formats at any time using built-in options in the dashboard as well as have access to their data in real time via API.
Data export formats
  • CSV
  • Other
Other data export formats
  • Microsoft Excel
  • PDF
  • JSON
Data import formats
  • CSV
  • Other
Other data import formats
  • JSON
  • Microsoft Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99% service availability, assured by Cloud Service provider
Approach to resilience Available on request
Outage reporting Private dashboard and e-mail alerts. Clients will be notified about relevant outages on request (opt-in).

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Developers who have access to the server management interface via ssh must use pivate key authentication. Other, unused, access channels are blocked (telnet, ftp etc) on firewall level.
Access restriction testing frequency At least once a year
Management access authentication Other
Description of management access authentication Private key ssh connection

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Our CEO is directly responsible for Security Governance. This starts with a Company Culture which puts a big emphasis on data security. All security policies and procedures are approved and enforced by CEO.
Key areas such Product Development, controls on access to office building and devices are reviewed regularly for security risk.
Information security policies and processes Internal Security Policies are the direct responsibility of CEO. All team members including Technical, Marketing, Sales and Support must adhere to the policies and report any non-compliance they witness to the CEO.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Code changes pass through testing and review process to ensure all security implications are assessed.
Vulnerability management type Undisclosed
Vulnerability management approach Patches can be deployed within an hour from the threat being discovered. Patches pass through the same automated testing process as regular updates before being automatically deployed.
Protective monitoring type Undisclosed
Protective monitoring approach Compromises are identified via regular code review process. Any issues are addressed immediately after discovery (within 48 working hours).
Incident management type Undisclosed
Incident management approach Users can report an incident via e-mail or a form available in the system. Similarly incident reports will be communicated via e-mail.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £10 per unit per year
Discount for educational organisations No
Free trial available Yes
Description of free trial This includes:
1. Access to app within the customer organisation
2. Trial expires after one month
3. Online/email/phone support
Link to free trial

Service documents

Return to top ↑