MEG
Quality management & compliance system for healthcare with modules for audit, incident reporting, risk, quality improvement planning, document management and clinical guidelines. Effectively govern quality systems that extend hospital-wide with a user-friendly, all-in-one solution to reduce risk, boost frontline productivity and lower the costs and complexities associated with multi-system use.
Features
- Audit Management tools: use on any device, customise audits 'in-house'
- Risk Management: incident reporting, risk register & risk assessment tools
- Quality Improvement Planning tool: full task management & quality assurance
- Real-time reporting on any device
- Management dashboards: set KPI targets and deviation alerts; BI integration
- Operate offline or in areas of poor connectivity
- Document Management & Control: easy search, version control, instant update
- Clinical Guidelines/Hospital Content on Mobile Devices: manage content 'in-house'
- Fully configurable, automated workflows for QI, Compliance & Incident Management
- User-friendly, all-in-one system to govern & connect quality systems organisation-wide
Benefits
- Paperless workflows for 10x improvements to audit management efficiency
- Understand risk across hospital(s), departments or wards
- Improved mobile Incident Reporting workflows to combat under-reporting
- Better informed decision-making
- Work flexibly anywhere, on any device, online or offline
- Integrate with hospital systems for better user experience
- Encourage accountability with point-of-care tools to deliver on care commitments
- CQC & CQUIN Compliance Management
- Assure the board of compliance with standards
- Intuitive admin interface means organisations are self-reliant in system configuration
Pricing
£10 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 11
Service ID
8 6 9 3 9 4 5 6 0 4 9 1 4 5 5
Contact
MEG Support Tools
Kerrill Thornhill
Telephone: 020 3322 5406
Email: enquiries@megsupporttools.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
-
We aim to support latest versions of popular browsers and we're backwards compatible with older versions of browser and operating systems multiple versions behind.
The app requires Internet access to log in and upload data, but can be used offline during inspection.
If data collection using a mobile device is required, MEG is compatible with iOS and Android OS, multiple versions behind. - System requirements
-
- Recent version of a supported web browser
- Internet Access
- Software license required to use
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We aim to respond to clients within 4 working hours for High Level support issue, within 24 hours for Normal Level support issue during weekdays.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Online, email and phone support are included within the software licence fee. On-site support will be provided at a cost of £900 per day excluding VAT.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Users will be provided with all the material needed to get started with the application: User guides, support documentation, how-to videos.
Onsite training is provided for customers who require a supported implementation, along with set-up support. All of this can be tailored to a specific client's needs. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- MEG will provide the client with its data in an electronic csv or Excel format for compatibility with future systems.
- End-of-contract process
-
At the end of a contract, MEG will archive or delete the data as per client's request.
If required, MEG will supply the client with its inspection data in electronic csv or Excel format for compatibility with future systems.
All users' access to MEG will be revoked.
If historical data is required in a tailored format, MEG can supply this to the client at an additional cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile-optimized page layout is used on mobile devices, but features remain the same as on desktop version.
- Service interface
- Yes
- Description of service interface
- Our web portal allows users with sufficient privileges to view reports, review submitted data and manage the hospital's resources (users, wards, rooms etc.)
- Accessibility standards
- None or don’t know
- Description of accessibility
- No limitation for users using accessibility technologies.
- Accessibility testing
-
We've tested the system using text scaling option.
Text scaling feature is built into the mobile app. - API
- Yes
- What users can and can't do using the API
-
API can be used to access hospital's resources such as ward structure, audit forms and raw audit data.
API can be used to submit audit data.
Other features are available on request. - API documentation
- Yes
- API documentation formats
-
- HTML
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The following can be configured by the client from user dashboard (with specific user credentials):
1. Setting and updating of users passwords.
2. Granting access to auditors to new audits.
3. Setting up and changing of custom audits: editing questions and answers, compliance calculation of question, help text, supporting graphic, order of questions, order of question categories / sections, making questions required/not required, etc.
4. Setting up and changing of sites, directorates, wards, auditor teams, etc.
5. Customisation of audit schedules.
6. Excel download of data can be customised by fields required.
The following can be configured by MEG:
1. Customisable graphs and reports to clients needs.
2. RAG scores per audit.
3. Customisation of QIP (Quality Improvement Plan) dashboard layout.
4. Add signature required to specific audit forms.
Scaling
- Independence of resources
- We have a strategy in place to ensure that users are not affected by increased demand and we monitor our servers continuously. We also monitor our service levels to ensure sufficient support staff are available to meet customers' needs.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Users can view metrics of inspection usage through the Web Portal dashboard.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Physical access control, complying with another standard
- Other
- Other data at rest protection approach
- Private key authentication is required to access servers over ssh
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can export their audit data to pdf, Excel, csv formats at any time using built-in options in the dashboard as well as have access to their data in real time via API.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Microsoft Excel
- JSON
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- JSON
- Microsoft Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99% service availability, assured by Cloud Service provider
- Approach to resilience
- Available on request
- Outage reporting
- Private dashboard and e-mail alerts. Clients will be notified about relevant outages on request (opt-in).
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Developers who have access to the server management interface via ssh must use pivate key authentication. Other, unused, access channels are blocked (telnet, ftp etc) on firewall level.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Other
- Description of management access authentication
- Private key ssh connection
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Our CEO is directly responsible for Security Governance. This starts with a Company Culture which puts a big emphasis on data security. All security policies and procedures are approved and enforced by CEO.
Key areas such Product Development, controls on access to office building and devices are reviewed regularly for security risk. - Information security policies and processes
- Internal Security Policies are the direct responsibility of CEO. All team members including Technical, Marketing, Sales and Support must adhere to the policies and report any non-compliance they witness to the CEO.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Code changes pass through testing and review process to ensure all security implications are assessed.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Patches can be deployed within an hour from the threat being discovered. Patches pass through the same automated testing process as regular updates before being automatically deployed.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Compromises are identified via regular code review process. Any issues are addressed immediately after discovery (within 48 working hours).
- Incident management type
- Undisclosed
- Incident management approach
- Users can report an incident via e-mail or a form available in the system. Similarly incident reports will be communicated via e-mail.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £10 a unit a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
This includes:
1. Access to app within the customer organisation
2. Trial expires after one month
3. Online/email/phone support - Link to free trial
- https://www.megsupporttools.com/contact