Public View

Public View

Public View is a healthcare analytics service that connects hundreds of public data sources and presents them in an intuitive dashboard for use in fast paced environments such as board meetings.

Equipped with full benchmarking capabilities and advanced analytical tools, including SPC, Public View is ideal for supporting quality improvement.


  • Live display of performance against NHS standards and public metrics
  • Optimised for PC, tablet and phone including offline working app
  • Ranking, trend, change, delta and SPC charts for all metrics
  • Pre-built peer groups including CQC rating, STP Members and Recommended
  • HCPS metric provides view of aggregate performance and CQC prediction
  • Quick links to metric description, information, and original source data
  • Full implementation support including getting started videos and comprehensive FAQ
  • Easy self-registration and password management for unlimited users
  • Single page board view (extension feature)
  • Supplement with your own local data (extension feature)


  • Use as / support board Integrated Performance Report (IPR)
  • Enable engagement across the organisation with unlimited users
  • Ensure 100% data accuracy in board reports
  • View the full performance of any NHS provider or system
  • Compare performance against multiple customisable peer groups simultaneously
  • Use benchmarking and SPC tools to support quality improvement
  • Set custom peer-based targets and toggle between them instantly
  • View historic performance dashboards using track back feature
  • Compare specialty and sub-indicator performance (extension feature)
  • Embed dashboard on intranet for login free access (extension feature)


£15,000 a unit a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

9 3 2 9 0 8 5 6 0 6 1 3 2 6 3


Public View Thomas Ridgeway
Telephone: 07971828709

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
Users must be employees of the buyers
System requirements
Access to a modern internet browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Maximum response time of 24 hours. Most support requests are responded to within an hour.
User can manage status and priority of support tickets
Phone support
Web chat support
Onsite support
Support levels
All support is included in the annual subscription price.
Support includes;
Trouble shooting user registration issues
Login or account access issues e.g. forgotten password or locked account

Any issues or concerns will be handled by an account manager and where necessary be supported by a software engineer.
Support available to third parties

Onboarding and offboarding

Getting started
Comprehensive user documentation
Video tutorials
Service documentation
End-of-contract data extraction
Not applicable - there is no data provided by the users
End-of-contract process
The buyer will be contacted three months prior to the end of the contract to discuss renewal options. If the buyer wishes to continue their subscription a new contract will be issued. If the buyer decides not to renew the contract access for all users linked to the buyer will be ceased on the contract end date.

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
All features are accessible through the mobile service.
Layout of the main screen is simplified to fit the smaller window.
Service interface
Customisation available


Independence of resources
The system is built upon a scale-able Azure platform that can be expanded as required.


Service usage metrics
Metrics types
User page views
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
Other data at rest protection approach
MS Azure infrastructure meets a broad set of international and industry-specific compliance standards, such as ISO 27001, HIPAA, FedRAMP, SOC 1, and SOC 2. Azure also meets country- or region-specific standards, including Australia IRAP, UK G-Cloud, and Singapore MTCS. Rigorous third-party audits, such as those done by the British Standards Institute, verify adherence to the strict security controls these standards mandate.
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Usage information is available upon request from
Data export formats
Data import formats
Other data import formats
None - Data uploaded is from public domain sources only

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We do not provide any SLAs that guaranteed levels of availability.

Our historic availability is 100% through the use of distributed cloud based technology. Our application is fully functional when offline.
Approach to resilience
We use multiple distributed databases redundantly connected to multiple distributed application servers, hosted in multiple cloud based data centres.

System snapshots are automatically taken, and multiple deployment slots are used to enable seamless reversible system updates.

Staging servers are used to test new system updates are used to test ahead of general release.

Clients software is designed to be fully resilient to network failure.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Blog and database are fire-walled to developer IP addresses and both are protected by username and password. Management accounts are protected by two factor authentication. Azure control is protected by two factor authentication.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
No audit information available
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We ensure compliance to the ISO27001 standard.
Information security policies and processes

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our systems are built using modern technologies including visual studio and GIT which together provide distributed version control for our system components.

Each changes is assessed by a senior developer for potential security impacts prior to approval for development. New versions are security tested in a staging environment prior to release.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Every new feature is assessed from a vulnerable management perspective. We look at how the feature may be broken into and what the consequences would be. Security and vulnerability management is baked into our process with a analysis always preceding development.

With our resilient staging approach to deployment we can develop and deploy patches within minutes should that be necessary.

Our engineers are closely connected to white hat security sources and take efforts to keep up to data with industry issues.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All systems are monitored in real time and alert operations staff to system anomalies. Operations staff are our developers and they make immediate triage decisions based upon the nature of the potential compromise.

Our response speed is therefore second to none.
Incident management type
Supplier-defined controls
Incident management approach
All events are treated with the same process. We use visual studio to ticket incidents, irrespective of their source (users or other). Where necessary copies of the original incident reports are provided to users.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£15,000 a unit a year
Discount for educational organisations
Free trial available
Description of free trial
Full access for 7 days
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.