Sitekit Digital Health

Lifebook (PHR Platform)

Lifebook is a technology platform for mobile health applications. It is an application that Sitekit can customise and re-brand to produce healthcare apps targeted at specific care pathways. Lifebook encompasses an electronic Person Held Record (PHR) with additional features for health professional messaging, reminders, pathway alerts and record patient observations.


  • Digital PHR
  • Electronic record to help patients manage their health
  • Enables data sharing throughout individuals' circle of care
  • Customisable to any care pathway
  • Enable interoperability (FHIR, LHCR)
  • Enabling localisation
  • Respond to 'Personalised Health and Care 2020'


  • Optimise care pathways
  • Improve patient understanding of health and care
  • Deliver 'Personalised Health and Care 2020'
  • Move from paper to paper-light or paperless
  • Enabling collaboration across service and borders
  • Enable patient activation
  • Enabling Open APIs across services and borders
  • Enable digital transformation of services
  • Establish and share data with a patient's circle of care
  • Improved patient safety & improve quality of care


£0.99 to £6 per person

Service documents


G-Cloud 11

Service ID

9 9 3 1 9 0 4 0 2 4 0 2 4 0 8


Sitekit Digital Health

Michael Catania

0845 299 0900

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
Maintenance releases: from time to time, maintenance releases of the software will be carried out to fix outstanding software faults and maintain compatibility with the current versions of any third-party software used. By default, such maintenance releases will be carried out every three (3) months. This may be varied by mutual agreement.
System requirements
Internet connectivity from the commissioning region's networks

User support

Email or online ticketing support
Email or online ticketing
Support response times
The support provided via the Sitekit Service Desk is via both email and phone, Monday to Friday 9am to 5pm excluding UK bank holidays.

Out of hours emergencies are ticketed via our emergency email address, which goes directly to our out of hours support.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
The following provided as standard: 1)Very High: A security breach whereby a third party gains access to personal data or an individual’s account may be compromised. A security alert that is categorised as being critical to data security. In the event of a security breach, the technician will take immediate action to limit further unauthorised access to the Infrastructure Applications. Investigative work to provide a resolution will then commence during Service Hours • Response: 30 minutes • Resolution: 8 service hours 2)High - An error that renders the software inoperative or causes the software to fail catastrophically. • Response: 1 service hour • Resolution: 16 service hours 3)Normal - An error that affects performance of the software and significantly degrades the use of the software. A security alert that is categorised as being medium severity. • Response: 1 service hour • Resolution: Best efforts to obtain resolution in 40 service hours 4)Low - An error that affects performance of the Infrastructure Applications but does not significantly degrade the use of the service. A security alert that is categorised as being low severity. • Response: 1 service hour • Resolution: Best efforts to put resolution in the next software release
Support available to third parties

Onboarding and offboarding

Getting started
1x half-day requirements workshop Simple PoC to test core user journeys
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Personal data is stored in the Microsoft Azure Secure Cloud-hosting environment, which is available to end users. Parents can export data on request. Sitekit will work with providers to support data extraction where required.
End-of-contract process
Off-boarding the service does not require any data extraction or removal processes. If an agency terminates the Lifebook service, all local interoperability will be stopped. End users will retain a copy of their health and care information.

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices
Differences between the mobile and desktop service
Mobile-first design principles adopted, native mobile controls are included. All web templates built using responsive web design; experience ultimately dependent on user's device, mobile operating system and browser of choice.
Service interface
Description of service interface
Users interact with the product via a timeline interface.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
The product has been tested on: ChromeVox, NVDA, VoiceOver. Lifebook can also be used with operating system screen magnifiers, such as ZoomText Magnifier
What users can and can't do using the API
Service APIs facilitate the following: - Patient subscription - Data sharing and consent management - Message exchange
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Customisation available
Description of customisation
Lifebook is designed to be localised with local services. Project teams can work with Sitekit to customise, offer trusted sources of information guidance, communications and data-recorded.


Independence of resources
ERedbook is built on Microsoft's Azure - platform services designed for on demand scalability to serve business-critical applications for many millions of users. Uptime is guaranteed by SLAs.


Service usage metrics
Metrics types
The following checks are made on a daily basis: • Services running correctly • Applications running correctly • Security and systems alerting running correctly • Number of registered users Monthly checks: • Release plan for new versions of services, applications • Security and support patches • Service utilisation • Support issues requiring escalation


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
End users can export their data via the platform from Cosmo database stored in Microsoft Azure.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9% - Service credits if Sitekit does not meet this level. Azure services according to Microsoft Azure SLAs:
Approach to resilience
Available on request
Outage reporting
Via Microsoft Azure status portal: Or additional tooling (e.g., Application Insights: An agency may commission Sitekit to monitor and report outages on its behalf.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces and support channels is restricted via username and password.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Centre for Assessment Ltd
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Our statement of applicability covers all the controls defined by ISO27001 with the exception of 14.2.7 Outsourced development and 11.1.6 Delivery and Loading Areas because they do not apply to us
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
All Sitekit staff are required to be aware of and comply with Sitekit's ISO 27001 ISMS (Information Security Management System), which documents Sitekit's security policies. Some policies will apply to all staff; some policies to specific departments or roles. All staff are must alert Sitekit's ISM (Information Security Manager) if they observe a policy breach; all staff are encouraged to alert the ISM if they see an opportunity for policy improvement.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Sitekit maintains an ISO27001 compliant vulnerability management process, available on request. Sitekit carries out threat-modelling as part of software design under the company's SDL (Secure Development Lifecycle); mitigation actions are then put in place. Sitekit will deploy patches either as part of scheduled software maintenance or immediately when Sitekit becomes aware of a Critical vulnerability. Sitekit runs frequent training sessions on emerging internet security threats.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Sitekit maintains an ISO27001 compliant protective monitoring process, available on request. Potential compromises are assigned the highest priority under Sitekit's SLA (Critical) and immediately investigated.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Sitekit maintains an ISO27001 compliant protective monitoring process, available on request. Potential compromises are assigned the highest priority under Sitekit's SLA (Critical) and immediately investigated.
Incident management type
Supplier-defined controls
Incident management approach
Sitekit maintains an ISO27001 compliant incident management process, available on request. Users would raise a support request with Sitekit's support desk; Sitekit will investigate the support requests and categorise as an incident if appropriate to do so. Sitekit maintains an ISO27001 compliant incident report template, available on request.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£0.99 to £6 per person
Discount for educational organisations
Free trial available

Service documents

Return to top ↑