Savant Limited

Li-LAC Human Milk Bank Software

Li-LAC is a Human Milk Bank software service, which manages all aspects of human milk donation, testing, production and distribution, providing traceability of product from donor to recipient.

Features

  • Specifically for managing human milk bank donations
  • Full traceability with comprehensive audit trail of all modifications
  • Enforces standardised labelling of products, integrated into production process
  • Multiple processing workflows can be defined and managed
  • Multiple processing workflows for different milk products and processes
  • Consistent, rigorous testing regime with profiles for donors and products
  • Control of products to ensure only authorised products are released
  • Ability to process ad hoc and standing orders
  • Facility to manage products in batches
  • Adheres to NICE Guidelines and ISBT128 barcode standard

Benefits

  • Only infrastructure required on site: PC, label printer and scanner
  • Provides a framework for centralised system for milk bank management
  • Guaranteed availability of system and security of data
  • Standardised processes ensure traceability and consistent labelling at all stages
  • Removes risk of unauthorised manufacturing processes being followed
  • Removes risk of contaminated products being released
  • Immediate visibility of milk stocks and their process state
  • Potential to increase the availability of donor milk
  • Maximises availability and potential health benefits of donor milk

Pricing

£250 to £2300 per licence per month

  • Free trial available

Service documents

G-Cloud 9

962465722980798

Savant Limited

Rachel Wood

01524784400

rachel.wood@savant.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints There are no service constraints.
System requirements
  • Web Browser - IE, Firefox, Chrome, Safari or Opera
  • Web or mobile internet access
  • PC, laptop or tablet
  • Scanner
  • Label Printer

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Initial response within 4 hours on working days between 8.30am and 5pm. 247 support can be provided at additional cost.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels There are 2 support levels:
Basic support providing telephone and email support on all working days between the hours of 8.30am and 5pm. This is included in the licence price.
Enhanced support to cover other hours as required. Costs can be provided on application.
All clients have a technical account manager who they can contact during working hours.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started User documentation is provided for the service.
A training course is provided for the service. The training can be carried out onsite or online.
Assistance is provided with data load and initial implementation.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Data can be extracted into Excel spreadsheets. All PDF documents can be extracted as PDFs.
End-of-contract process There will be no additional costs at the end of the contract unless the client specifically asked for data to be extracted for them in a specific format.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility Uncluttered layout. Good contrast and use of colours. Font size set to ensure easy to read. Intuitive menus appropriate to process.
Service is browser based so accessibility extensions within browsers can be used.
Accessibility testing No testing has been carried out with users of assistive technology.
API No
Customisation available No

Scaling

Scaling
Independence of resources We continually monitor the database sizes and the overall processing load on our servers and expand requirements to ensure no degradation in service. Our servers are specified to ensure they will maintain service with the maximum number of users permitted by the client licences.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Users can export their data into Excel spreadsheets.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • Word
  • RTF
  • MHT
  • HTML
  • Text
  • Image
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Li-LAC is currently hosted on a virtual server by Melbourne Server Support, part of the Iomart Group. They give a 99.95% Service Level Agreement (SLA) for network connectivity. This means that the client's server will be accessible via the internet for 99.95% of the time, which equates to a maximum of 4.38 hours downtime per year.
Approach to resilience Savant uses a number of datacentres to support its services. We ensure a high level of resilience as a priority. We will discuss and agree with a client the most appropriate datacentre to meet their needs.
Outage reporting Savant would contact our customers directly by phone or email in the event of any outage.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels ISO 27001 and 9001. Staff training
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 Lloyds Register
ISO/IEC 27001 accreditation date 29/01/2012
What the ISO/IEC 27001 doesn’t cover No aspect of the service is not covered by our ISO/IEC 27001 certification or the ISO/IEC 27001 certification of our hosting provider.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes The Improvements Manager reports to the Managing Director and is responsible for ensuring our Information Security policies are adhered to. Savant has an Information Security Procedure, which must be followed by all staff. The Procedure covers identifying interested parties and defining their interest, identifying information assets and categorising them, grouping information assets into information classes, identifying asset owners and assessing the class value. Risks are identified against each information asset, risks are linked to the ISMS controls; the likelihood of the risk occurring and the asset class risk of compromise are identified and the risk acceptance criteria are assessed. Treatment Plans are defined by asset class, the procedure for the execution of the treatment plan is defined and the procedures for re-assessing the risk score are documented. Regular internal audits ensure that the procedures are followed. Staff are encouraged to promptly report any suspected security breaches.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All services are subject to Savants configuration and change management procedures. Each service has a specific procedure defining the steps to be taken to release a new version. These procedures cover requirements specifications for all proposed changes, test scripts for all proposed changes, testing procedure to include regression testing, a release schedule, customer liaison and the production and issue of release notes. All bugs are recorded in our Testtrack system from initially being reported through to update of the software and release to the customer.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Savant continually assess vulnerabilities. We ensure that our hosting services provide the highest levels of vulnerability management. We maintain awareness of vulnerabilities that might effect our software services and regularly test/audit our software services to ensure any potential vulnerabilities are identified and corrected promptly.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Savant carries out daily checks on its server to identify any potential compromises. We also have email alerts set up to notify staff of any compromises. In the event of a potential compromise being identified we will immediately lock-down the server affected and inform any affected customers. We aim to respond to any such incidents as quickly as possible and in any event within one hour during normal working hours. Outside of normal working hours, our hosting provider would take action on our behalf.
Incident management type Supplier-defined controls
Incident management approach Savant has a Business Continuity Plan that identifies our critical services and the actions to be taken in the event of an incident. Savant uses a hosted Business Continuity software service to store and maintain its Business Continuity data and Plans. Processes are defined to be followed in the event of specific incidents. There is a defined process for users to report incidents using the business continuity software enabling text messages to be sent to the Incident Management team. All details of an incident are recorded and an Incident Management report is produced by the software recording all actions taken.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £250 to £2300 per licence per month
Discount for educational organisations No
Free trial available Yes
Description of free trial Access provided on a hosted server for a limited time of up to one month for users to try out the system.

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑