Compliance Scorecard

Automated Registrations

Organisation:
Healthtech-1
Product Type:
Software as a Service (SaaS)
Product Purpose:
Process Automation (non-clinical)

93%

Overall Score
Information Security and Privacy
94%
Interoperability
100%
Usability and Accessibility
90%
Clinical
Clinical
Not applicable
Information Commissioner's Office (ICO) registration
3a answer
The supplier is not registered with the ICO.

All organisations in the UK that "process data" should be registered with the ICO. Processing means carrying out any action related to data, including collecting, storing, amending, consulting, sharing, transferring, etc.. Data in the meaning of the UK GDPR is related to "personally identifiable data", which means information that can be directly or indirectly linked to an individual person.
The supplier has indicated that it is registered at the ICO. This registration must be renewed each year.
cancel
Unverified
Unable to verify the registration of Healthtech-1 on the ICO database
The supplier has indicated that it is registered at the ICO. This registration must be renewed each year.
CHECK_CIRCLE
Verified
We have verified the registration of Healthtech-1 on the ICO database
Access to personally identifiable or NHS-held patient data?
3b answer
The supplier does not have access to any personally identifiable data or NHS-held patient data.

As such, the supplier does not have to submit a Data Protection Impact Assessment.
The supplier has access to personally identifiable data or NHS-held patient data.

As such, the supplier has to submit a Data Protection Impact Assessment.
Data Protection Impact Assessment (DPIA)
3c answer
The supplier has access to personally identifiable data or NHS-held patient data, but they have not completed a Data Protection Impact Assessment for their product.

In order for this supplier to be compliant, a DPIA must be carried out. The organisation procuring this solution must ensure that they have accepted the supplier's DPIA before adopting their product or carry out a DPIA themselves.
The supplier has carried out a DPIA and provided this DPIA for review.
offline_bolt
AI analysis
DSPT compliance
3E ANSWEr
The supplier is not compliant with the annual Data Security and Protection Toolkit (DSPT). The DSPT is an online self-assessment tool employed by the NHS to assess their suppliers on their information security and privacy posture. The DSPT must be submitted each year.

In order to find out more about the requirements of the DSPT, please consult Naq's blog here.

In order to view the NHS' assessment criteria for the DSPT, please download the NHS guidance here.

Here is also a useful guidance document on the roles and responsibilities that are necessary to assign as part of the DSPT requirements.
Cyber Essentials Certification
3f answer
The supplier does not have a valid Cyber Essentials Certificate.

All NHS suppliers must hold a valid Cyber Essentials certificate which was issued within the last 12 months.

Cyber Essentials is controlled by the National Cyber Security Centre (NCSC) and certificates are issued and managed by IASME. Cyber Essentials ensures an organisation meets the minimum requirements of information security against five areas: Firewalls, Secure configuration, Security update management, User access control and Malware protection.

The supplier may need to obtain Cyber Essentials Plus. Cyber Essentials Plus provides greater assurance than Cyber Essentials because the suppliers' IT systems will be independently verified by a security expert.

Both Cyber Essentials and Cyber Essentials Plus require annual recertification.
The supplier has stated they hold a valid Cyber Essentials Certificate, but we have been unable to verify this.

The supplier must make sure that they renew their Cyber Essentials certificate in plenty of time before it expires, as they cannot be DSPT compliant, and therefore not DTAC compliant, without a valid Cyber Essentials certificate.
cancel
Unverified
Unable to verify that Healthtech-1 holds a valid Cyber Essentials certification
The supplier holds a valid Cyber Essentials Certificate.

The supplier must make sure that they renew their Cyber Essentials certificate in plenty of time before it expires, as they cannot be DSPT compliant, and therefore not DTAC compliant, without a valid Cyber Essentials certificate.
CHECK_CIRCLE
Verified
We have verified that Healthtech-1 holds a valid Cyber Essentials certification
Nominated Data Protection Officer (DPO)
3g answer

The supplier does not have an appointed Data Protection Officer. Not all organisations need to officially appoint a Data Protection Officer.

The supplier needs to appoint a Data Protection Officer if:

  • They are a public authority or body (except for courts acting in their judicial capacity)
  • Their core activities require large scale, regular and systematic monitoring of individuals (for example, online behaviour tracking)
  • Their core activities consist of large scale processing of special categories of data or data relating to criminal convictions and offences.

Most organisations that process some form of health or medical data as a core element of their product will need to appoint a DPO. The most common reason for organisations providing digital health technologies to have a DPO is due to the core activities involving processing health data (being a special category).

Please consult this ICO checklist (https://ico.org.uk/for-organisations/data-protection-fee/does-my-organisation-need-a-data-protection-officer-dpo/) to review whether you need a DPO.

The supplier has appointed a Data Protection Officer.
ICO self-assessment DPO checklist
3h answer
The supplier has not appointed a Data Protection Officer and has not completed the ICO checklist to ensure that they are not breaching GDPR by not appointing a DPO either.

This supplier is not compliant with the requirements of the GDPR regarding protection of personally identifiable data.
The supplier has not appointed a Data Protection Officer but has completed the ICO checklist to ensure that they are not in breach of GDPR by not appointing a DPO.
DPO or responsible individual sign-off
3i answer
The supplier's DPO (or another responsible individual if they don't need to appoint a DPO) has not signed off on their risk assessments, access control measures and system-level security policies.

The DPO or the other responsible individuals must review the supplier's risk assessments, controls and policies at least annually. This supplier is not compliant with the requirements of the GDPR regarding protection of personally identifiable data.
The supplier's DPO (or another responsible individual if they don't need to appoint a DPO) has signed off on their risk assessments, access control measures and system-level security policies.

The DPO or the other responsible individuals must review the supplier's risk assessments, controls and policies at least annually.
Data stored outside of United Kingdom
3j answer
The supplier stores data outside of the UK.
The supplier does not store any data outside of the UK. This is the best case scenario when supplying their product to the NHS.
Data stored outside of countries with Adequacy Decisions
3K answer
The supplier stores data outside of the UK but these countries do not ensure adequate protection for British citizens or residents, or the supplier is not sure if they do.

Best practise when supplying products to the NHS is that all data remains within the UK. In the edge cases that data does leave the UK, suppliers are responsible for ensuring that this data is transferred to areas covered by similar data protection legislation as in the UK, which will have been determined by the UK government through so called 'Adequacy Decisions'.

An Adequacy Decision is a decision by the UK government (or the European Union Commission and referred to by the UK government) that determines that a certain country or area provides 'adequate protection' for British citizens or residents from a data protection perspective. Suppliers may only transfer data outside of the UK if they are transferring data to organisations located in a country or an area that is covered by an adequacy decision.

The list of countries for which an adequacy decision exists can be found here
The supplier stores data outside of the UK and they have ensured that the countries that they send data to are covered by an adequacy decision.
Penetration testing
3l answer
The supplier has not carried out a pentest of their product in the last 12 months.
The supplier has carried out a pentest of their product in the last 12 months.
offline_bolt
AI analysis
Source code security review
3n answer
The supplier's source code has not undergone a source code security review and is therefore not compliant with NHS requirements.
The supplier's source code has undergone a source code security review.
Multi-Factor Authentication (MFA)
3o answer
Privileged accounts in your product and across the organisation do not have appropriate multi-factor authentication.

It is now a hard requirement by the NCSC through Cyber Essentials that all user accounts, not just accounts with privileged levels of access (i.e. admin accounts) must have Multi-Factor Authentication (MFA) enabled (this is sometimes referred to as Two-Factor Authentication or 2FA).

You can find more about MFA here.

You should ensure that all of the online products your organisation and product uses (e.g. Google Workspace, Office 365, Azure, AWS, GCP) have MFA enforced for all users, if available.

There are many forms of MFA that are acceptable including numeric codes generated by a mobile phone app, a code sent to your email, an SMS sent to a mobile phone or a physical device such as a YubiKey. It is imperative that you enforce MFA for all users, as this is the single most effective way to stop the majority of cyber incidents.
All privileged accounts in your product and across the organisation have appropriate multi-factor authentication.

However, it is now a hard requirement by the NCSC through Cyber Essentials that all user accounts, not just accounts with privileged levels of access (i.e. admin accounts) must have Multi-Factor Authentication (MFA) enabled (this is sometimes referred to as Two-Factor Authentication or 2FA).

You can find more about MFA here.

You should ensure that all of the online products your organisation and product uses (e.g. Google Workspace, Office 365, Azure, AWS, GCP) have MFA enforced for all users, if available.
Logging and monitoring
3p answer
The supplier has not defined and implemented logging and monitoring on their product.

Part of the DTAC requirements is that the supplier defines a logging and monitoring plan and that they have implemented this on their product.

Monitoring data could come from event-driven logs, such as website connections, or device configurations details, such as the current operating system version running on a device. A basic form of logging and monitoring is required to ensure the supplier meets quality, safety and information security obligations.
The supplier has defined and implementing logging and monitoring on their product.
Load testing
3q answer
The supplier's product has not yet been load tested.

To verify that the supplier's product can meet its security, availability and performance requirements, the DTAC requires suppliers to ensure it is regularly load tested. It is also recommended that suppliers perform stress testing to take their product past its designed tolerance and capacity.

What suppliers are testing during a load test is whether their product can meet the expected peak load conditions, for example, the number of concurrently logged-in users or database operations. They must ensure that the results of the load testing satisfy their product requirements as well as those of the procuring organisation.

It is also recommended that suppliers test their product past its designed tolerances by performing stress testing. Examples of stress testing include adding significantly more users than one would expect during normal operations or performing database operations at a rate that far exceeds the designed limits. That way, the supplier can see where the boundaries of their product are, which enables them to plan appropriately.
The supplier's product has been load tested. This enables the supplier to verify that their product can meet its security, availability and performance requirements.
Third-party products
3r answer
The supplier's product does not connect to any third-party products.
The supplier's product connects to third-party products.
Risk Management Process
3s answer
The supplier's product connects to third party products, but the supplier has not ensured that they have considered all risks associated with these third party products to ensure the third party is compliant with NHS- and GDPR requirements.

Supply-chain incidents are extremely common and this therefore poses a high risk to the procuring organisation.
The supplier's product connects to third party products, and the supplier has ensured that they have considered all risks associated with these third party products to ensure the third party is compliant with NHS- and GDPR requirements.
API exposure
4a answer
The product does not expose any API's or integration channels for other consumers. In principle, the DTAC requires suppliers to have API’s that are relevant to the use case for the product, which follow Government Digital Services Open API Best Practice, are documented and freely available and that third parties have reasonable access to connect.

If the product does not have API’s and there is a legitimate rationale for this considering the use case of the product, the producing organisation may accept this rationale. The supplier must then state the reasons why they do not expose any APIs in their DTAC documentation.
The product does expose API's and fully adheres to the criteria below.
The product does expose API's but does not fully adhere to the criteria below.
Healthcare standards of data interoperability
4b answer
The suppliers' product exposes Application Programme Interfaces (API's) or integration channels for other consumers but the APIs do not set out the healthcare standards of data interoperability.

As part of the DTAC requirements, developers must set out the healthcare standards of data interoperability e.g., Health Level Seven International (HL7) / Fast Healthcare Interoperability Resources (FHIR) and demonstrate their compliance with these standards to the procuring organisation in their DTAC submission.
The supplier's product exposes Application Programme Interfaces or integration channels for other consumers and the APIs set out the healthcare standards of data interoperability. This means that the supplier is following NHS guidance on interoperability.
Government Digital Services Open API Best Practice
4c answer

The product exposes APIs or integration channels for other consumers, but does not follow the Open API Best Practice from Government Digital Services. Any APIs exposed by the product must follow the best practices set out by the UK Government.

You can find these best practices here.

The Government Digital Services (GDS) Open API Best Practices are a set of guidelines for designing, building and operating APIs for use in government and public services, including the NHS. They aim to provide consistency, quality and usability for APIs across different platforms and services.

The key requirements of the GDS Open API Best Practices are:

  • Use a design-first approach:
    Plan what the API will do and how it will work before coding, based on user and business needs. Test and iterate the design based on feedback. Check for existing APIs that could be reused or adapted;
  • Follow the API technical and data standards:
    Use the standards that describe how to design, build and operate APIs in a consistent way. They cover aspects such as security, versioning, naming, data formats, error handling, and documentation;
  • Use GraphQL for your API:
    Use GraphQL, which is a query language and a set of tools for building APIs with a flexible data schema. It allows users to request only the data they need, and supports multiple formats and protocols;
  • Define an API management strategy:
    Define a strategy that covers aspects such as security, monitoring, testing, and governance. Manage your APIs to meet user needs by following the service lifecycle stages: discovery, alpha, beta, and live;
  • Document your APIs:
    Document your APIs using clear and concise language, and provide reference documentation for developers. Use tools and frameworks that can generate documentation from the API specification or code.


The supplier must make sure that the APIs or integration channels their product exposes follows the GDS Open API Best Practice.

The supplier's product exposes APIs or integration channels for other consumers, which follow the Open API Best Practice from Government Digital Services.

Any APIs exposed by products procured within the NHS must follow the best practices set out by the UK Government.

For reference, you can find these best practices here.
APIs documented and freely available
4d answer

The supplier's APIs are not documented and freely available. Part of the DTAC requirements is that suppliers provide clear documentation for any APIs the product exposes and make their APIs freely available.

To address this issue, the supplier should follow these steps:

  • Document APIs:
    Documenting APIs means providing clear and concise information about how to use and integrate with the supplier's APIs. This documentation should include details such as the available endpoints, methods, parameters, headers, data formats, error codes, and examples of requests and responses. The supplier should also provide reference documentation for developers, such as API specifications, user guides, or training materials.
  • Make APIs freely available:
    Making APIs freely available means allowing potential users to access and experiment with APIs without any barriers or restrictions. Suppliers should provide a sandbox or a test environment where users can try out their APIs and see how they work. They should also provide a way for users to register and obtain API keys or tokens, and manage their usage and permissions.
The supplier's APIs are documented and freely available. Part of the DTAC requirements is that they provide clear documentation for any APIs the supplier's expose and make their APIs freely available.
Do third parties have reasonable access to connect?
4e answer

Third parties do not have reasonable access to connect to the supplier's APIs. DTAC requires the supplier to ensure that third parties can connect to their APIs without needing to implement unreasonable methods.

To address this issue, the supplier needs to follow these steps:

  • Document their APIs:
    Provide clear and concise information about how to use and integrate with the supplier's APIs, such as the available endpoints, methods, parameters, headers, data formats, error codes, and examples of requests and responses.
  • Publish APIs:
    Make API documentation publicly available and discoverable, so that third parties can easily find and access it.- Support APIs: Provide ways for third parties to get help and support when using APIs, such as FAQs, forums, tutorials, or contact details. Suppliers can also collect feedback and suggestions from their API users, and use them to improve their API quality and usability.
Third parties have reasonable access to connect to the supplier's APIs. This means that the supplier has ensured that third parties have reasonable access to connect and that they do not introduce unnecessarily complex requirements or restrictions.
Documented detailed product description and architecture
4f answer

The supplier needs to create a detailed product description and architecture that aligns with the NHS architecture principles. Without this, it will be difficult for the purchasing organisation to understand the supplier's product.

The description and architecture should be aligned to the following NHS principles:

  • Deliver sustainable services:
    Consider the environmental, social and economic impact of the service life cycle.
  • Put NHS tools in modern browsers:
    Use browser based and open web standards, avoid proprietary or legacy technologies.
  • Internet first:
    Use internet standards and protocols, make services available over the public internet by default.
  • Public cloud first:
    Move to the public cloud unless there is a clear reason not to, benefit from scalability, security and cost savings.-
  • Build a data layer with registers and APIs:
    Store data once and share via open APIs, avoid data duplication and inconsistency.
  • Adopt appropriate cyber security standards:
    Follow the cyber security standards and guidance, keep software, networks and systems up to date.
  • Use platforms:
    Build upon existing platforms and common capabilities, avoid reinventing the wheel.
  • Put user needs first:
    Design services around user needs, use user research, feedback and testing.
  • Interoperability with open data and technology:
    Use open data and technology standards, enable interoperability and data sharing across the system.
  • Reuse before buy/build:
    Reuse existing solutions before delivering new ones, make new solutions reusable by others.

The supplier has detailed product descriptions and their documentation aligns with the NHS architecture principles.

In summary, the supplier's product should align with the following principles:

  • Deliver sustainable services:
    Consider the environmental, social and economic impact of the service life cycle.
  • Put NHS tools in modern browsers:
    Use browser based and open web standards, avoid proprietary or legacy technologies.
  • Internet first:
    Use internet standards and protocols, make services available over the public internet by default.
  • Public cloud first:
    Move to the public cloud unless there is a clear reason not to, benefit from scalability, security and cost savings.-
  • Build a data layer with registers and APIs:
    Store data once and share via open APIs, avoid data duplication and inconsistency.
  • Adopt appropriate cyber security standards:
    Follow the cyber security standards and guidance, keep software, networks and systems up to date.
  • Use platforms:
    Build upon existing platforms and common capabilities, avoid reinventing the wheel.
  • Put user needs first:
    Design services around user needs, use user research, feedback and testing.
  • Interoperability with open data and technology:
    Use open data and technology standards, enable interoperability and data sharing across the system.
  • Reuse before buy/build:
    Reuse existing solutions before delivering new ones, make new solutions reusable by others.
NHS numbers to identify patient record data
5a answer
If the supplier's product currently holds, or will hold, patient record data, the supplier must ensure they meet all of the NHS requirements around security. The supplier does not use NHS numbers to identify patient record data at this time.
If the supplier's product currently holds, or will hold, patient record data, the supplier must ensure they meet all of the NHS requirements around security. The supplier uses NHS numbers to identify patient record data.
The product does not identify patient record data
NHS Login to establish a user's verified NHS number
5b answer
The supplier's product uses NHS numbers to identify patient record data but does not use NHS login to establish a user's verified NHS number.

If a product uses an NHS number to identify a patient record, NHS login must be used by the supplier. If the supplier doesn't use NHS login to establish a verified NHS number, a legitimate reason for not using NHS login should be provided to the procuring organisation in the DTAC submission, alongside the security measures and appropriateness of the methods that are used.

The NHS provides guidance on NHS Login for partners and developers here.
The supplier's product uses NHS numbers to identify patient record data and uses NHS login to establish a user's verified NHS number.
Clear documentation on the rationale behind not using NHS login to establish the NHS number and the associated security measures implemented?
5c answer
The supplier uses NHS numbers to identify patient record data, but does not use the NHS login to establish a user's verified NHS number.

Therefore, the supplier must provide clear documentation on the rationale behind not using the NHS login, alongside a clear description of the associated security measures they have implemented.

The supplier has not provided this clear documentation on the rationale behind not using NHS login nor the security measures taken.
The supplier uses NHS numbers to identify patient record data, but does not use the NHS login to establish a user's verified NHS number.

Therefore, the supplier must provide clear documentation on the rationale behind not using the NHS login, alongside a clear description of the associated security measures they have implemented.

The supplier has provided this clear documentation on the rationale behind not using NHS login nor the security measures taken.
Capability for read/write operations with electronic health records (EHRs)
5d answer
The supplier's product does not have the capacity for read/write into EHRs. To pass DTAC, the supplier must ensure they follow industry standards for secure interoperability. (e.g. OAuth 2.0, TLS 1.2) or mitigations, methodologies or measures commensurate with these standards.
The supplier's product has the capability for read/write operations with Electronic Health Records (EHRs) and uses industry standards for secure interoperability.
The product does not read/write EHRs
Industry standards for secure interoperability (e.g. OAuth 2.0, TLS 1.2) or mitigations, methodologies or measures commensurate with these standards when interfacing with EHRs
5e answer

The supplier's product has the capability for read/write operations with Electronic Health Records (EHRs) but does not use industry standards for secure interoperability.

In principle, suppliers should use industry standards for secure interoperability. When interfacing with EHRs without using industry standards (such as OAuth 2.0 or TLS 1.2) the supplier must ensure their product is implementing controls commensurate with these industry standards.

They must ensure they are implementing the following controls when connecting to EHRs:

  • Mutual authentication:
    Both parties must verify their identity using non-repudiable methods. For example, OAuth 2.0 allows clients to authenticate with the authorization server using mutual TLS, which is a method of verifying the identity of both parties using X.509 certificates. This prevents unauthorized clients from obtaining access tokens or impersonating legitimate clients. TLS 1.2 also enables the use of TLS extensions, such as Server Name Indication (SNI) or Application-Layer Protocol Negotiation (ALPN), that allow for better performance, compatibility, and flexibility of the protocol.
  • Authorization:
    Clients must obtain delegated access to protected resources using secure methods such as tokens. OAuth 2.0 also allows authorization servers to bind access tokens to the client’s mutual TLS certificate, which means that only the client that obtained the token can use it to access the protected resource1. This prevents token theft or replay attacks by malicious actors.
  • Encryption:
    Sensitive data must be encrypted using strong algorithms to prevent eavesdropping. TLS 1.2 provides a secure channel for the transmission of sensitive data, such as authorization codes, access tokens, user credentials, or API requests and responses. TLS 1.2 also supports stronger encryption algorithms, such as AES, and improved hashing and signing algorithms, such as SHA-256, that are resistant to brute-force attacks or collisions.- Integrity: Data should be hashed and signed to prevent tampering or modification. OAuth 2.0 and TLS 1.2 both use cryptographic techniques to ensure the integrity of the data and the parties involved. OAuth 2.0 uses digital signatures to verify the authenticity and validity of the access tokens and the authorization server. TLS 1.2 uses message authentication codes (MACs) to verify the authenticity and integrity of the messages exchanged between the client and the server.

The supplier's product has the capability for read/write operations with Electronic Health Records (EHRs) and uses industry standards for secure interoperability.

In summary, this means that the supplier has implemented the following measures:

  • Mutual authentication:
    Both parties must verify their identity using non-repudiable methods. For example, OAuth 2.0 allows clients to authenticate with the authorization server using mutual TLS, which is a method of verifying the identity of both parties using X.509 certificates. This prevents unauthorized clients from obtaining access tokens or impersonating legitimate clients. TLS 1.2 also enables the use of TLS extensions, such as Server Name Indication (SNI) or Application-Layer Protocol Negotiation (ALPN), that allow for better performance, compatibility, and flexibility of the protocol.
  • Authorization:
    Clients must obtain delegated access to protected resources using secure methods such as tokens. OAuth 2.0 also allows authorization servers to bind access tokens to the client’s mutual TLS certificate, which means that only the client that obtained the token can use it to access the protected resource1. This prevents token theft or replay attacks by malicious actors.
  • Encryption:
    Sensitive data must be encrypted using strong algorithms to prevent eavesdropping. TLS 1.2 provides a secure channel for the transmission of sensitive data, such as authorization codes, access tokens, user credentials, or API requests and responses. TLS 1.2 also supports stronger encryption algorithms, such as AES, and improved hashing and signing algorithms, such as SHA-256, that are resistant to brute-force attacks or collisions.- Integrity: Data should be hashed and signed to prevent tampering or modification. OAuth 2.0 and TLS 1.2 both use cryptographic techniques to ensure the integrity of the data and the parties involved. OAuth 2.0 uses digital signatures to verify the authenticity and validity of the access tokens and the authorization server. TLS 1.2 uses message authentication codes (MACs) to verify the authenticity and integrity of the messages exchanged between the client and the server.
Wearable or device, or integrates with them
5f answer
The product is not a wearable or medical device and does not integrate with a wearable or medical device. The product therefore does not have to comply with ISO/IEEE 11073 Personal Health Data (PHD) standards.
The product is a wearable or medical device, or integrates with them, and thus must comply with ISO/IEEE 11073 Personal Health Data (PHD) standards.
ISO/IEEE 11073 Personal Health Data (PHD) compliance
5g answer

The product is a wearable or device, or integrates with them, and thus must comply with ISO/IEEE 11073 Personal Health Data (PHD) standards. The supplier's product is not yet compliant with ISO/IEEE 11073 Personal Health Data (PHD) standards.

The ISO/IEEE 11073 standards set out the requirements for communication between medical, health care and wellness devices and external computer systems. They require developers to take certain measures to ensure that medical, healthcare and wellness devices are interoperable and can exchange data between them efficiently and securely.

Some of the overarching principles of the standards are:

  • Interoperability:
    Devices must use defined protocols for communication, enabling them to exchange data seamlessly regardless of manufacturer or technology.
  • Data Security and Privacy:
    Mechanisms are employed to ensure only authorized devices and users can access and manage data and data is encrypted.
  • Data Integrity and Quality:
    Mechanisms are implemented to identify and handle potential errors in data transmission and storage. The supplier will need to understand your product in depth to then be able to decide which ISO/IEEE 11073 standard is applicable to the product. For instance:
    1. Nomenclature (ISO/IEEE 11073-10101):
      If the device uses standardized medical terminology for data elements, this sub-standard is relevant.
    2. Domain information model (ISO/IEEE 11073-102xx):
      This sub-standard defines data structures for specific medical domains (e.g., cardiology, respiratory). Choose the sub-standard that aligns with the device’s data type.
    3. Application profiles (ISO/IEEE 11073-104xx):
      These define communication protocols for specific device types or applications. Identify the profile that matches the device’s functionality (e.g., vital signs monitoring, continuous glucose monitoring)
    4. Device descriptions (ISO/IEEE 11073-105xx):
      If the device requires a specific description for interoperability, this sub-standard might be relevant.

Further guidance can be found here.

The product is a wearable or medical device, or integrates with them, and thus must comply with ISO/IEEE 11073 Personal Health Data (PHD) standards. The supplier's product is already compliant with ISO/IEEE 11073 Personal Health Data (PHD) standards.

The supplier should make sure the product remains compliant by incorporating the requirements throughout any changes to the product.
Useability
5h answer

The useability requirements from the DTAC are aimed at ensuring that a supplier's product is appropriate for users and that their product is adequate in solving the problem that it sets out to solve.

To aid the useability of suppliers' products, the NHS requires suppliers to:

  • Define their ideal user profile in detail;
  • Survey people within the NHS who fit this profile;
  • Define the user benefits of their product;
  • Validate these assumed benefits with the NHS;
  • Develop and document user journeys;
  • Engage users in the development of the product;
  • Consider user needs and verify with the ideal users throughout the development process
  • Map all key user journeys to ensure that the whole problem is solved or it is clear to users how it fits into their own pathway or user journey.

The supplier has not carried out, or is still working towards, some or all of these requirements. In order to pass the useability assessment section of DTAC, all of these requirements must be fulfilled.

The useability requirements from the DTAC are aimed at ensuring that a supplier's product is appropriate for users and that their product is adequate in solving the problem that it sets out to solve.

To aid the useability of suppliers' products, the NHS requires suppliers to:

  • Define their ideal user profile in detail;
  • Survey people within the NHS who fit this profile;
  • Define the user benefits of their product;
  • Validate these assumed benefits with the NHS;
  • Develop and document user journeys;
  • Engage users in the development of the product;
  • Consider user needs and verify with the ideal users throughout the development process
  • Map all key user journeys to ensure that the whole problem is solved or it is clear to users how it fits into their own pathway or user journey.

The supplier is still working towards, some or all of these requirements. In order to pass the useability assessment section of DTAC, all of these requirements must be fulfilled.

The useability requirements from the DTAC are aimed at ensuring that a supplier's product is appropriate for users and that their product is adequate in solving the problem that it sets out to solve.

To aid the useability of suppliers' products, the NHS requires suppliers to:

  • Define their ideal user profile in detail;
  • Survey people within the NHS who fit this profile;
  • Define the user benefits of their product;
  • Validate these assumed benefits with the NHS;
  • Develop and document user journeys;
  • Engage users in the development of the product;
  • Consider user needs and verify with the ideal users throughout the development process
  • Map all key user journeys to ensure that the whole problem is solved or it is clear to users how it fits into their own pathway or user journey.

The supplier has carried out all of these requirements.

User acceptance testing
5p answer
User Acceptance Testing (UAT) is a crucial part of demonstrating compliance with usability and accessibility requirements. Usability testing helps in ensuring that the product is simple to use, which is especially important when thinking about patient pathways and how products should help patients or other users solve important problems.

The NHS DTAC asks product developers to carry out user acceptance testing. The supplier has not yet carried out user acceptance testing.
User Acceptance Testing (UAT) is a crucial part of demonstrating compliance with usability and accessibility requirements. Usability testing helps in ensuring that the product is simple to use, which is especially important when thinking about patient pathways and how products should help patients or other users solve important problems.

The NHS DTAC asks product developers to carry out user acceptance testing. The supplier has not yet carried out user acceptance testing but is working towards it.
User Acceptance Testing (UAT) is a crucial part of demonstrating compliance with usability and accessibility requirements. Usability testing helps in ensuring that the product is simple to use, which is especially important when thinking about patient pathways and how products should help patients or other users solve important problems.

The NHS DTAC asks product developers to carry out user acceptance testing. The supplier has carried out user acceptance testing.
Service Level Agreement
5q answer
The supplier does not provide a Service Level Agreement to all customers purchasing the product.
The supplier provides a Service Level Agreement to all customers purchasing the product.
Response times, support, and availability performance reporting
5r answer
The suppliers does not report to all customers on its performance with respect to support, system performance and availability.
The suppliers reports to all customers on its performance with respect to support, system performance and availability.
Average uptime of over 99.9%
5s answer
The supplier has not maintained an average uptime of 99.9% over the last 12 months.
The supplier has maintained an average uptime of 99.9% over the last 12 months.
Average uptime of over 99%
5t answer
The supplier has not maintained an average uptime of 99% over the last 12 months.
The supplier has maintained an average uptime of 99% over the last 12 months.
Web Content Accessibility Guidelines (WCAG) 2.1 level AA compliance
5u answer

The product is not Web Content Accessibility Guidelines Level AA compliant. The DTAC requires suppliers to make sure that people with different physical, mental health, social, cultural or learning needs can use their product, whether it's for the public or staff.

Accessibility is about making digital services work for everyone, including people who face barriers related to:

  • Hearing, like people who are deaf or have hearing loss;
  • Mobility, like people who find it difficult to use a mouse;
  • Thinking or understanding in a different way, like autistic people or people with dyslexia or learning difficulties;
  • Vision, like people who are blind, partially sighted or colour blind.
The supplier's product is Web Content Accessiblity Guidelines Level AA compliant.

The DTAC requires suppliers to make sure that people with different physical, mental health, social, cultural or learning needs can use their product, whether it's for the public or staff.
Working towards it
Common components and patterns
5v answer

The DTAC requires suppliers to use common components and patterns in the development of their product. The supplier does not use common components and patterns in their product.

Examples of these components and patterns are:

  • Content design patterns:
    Templates for structuring different types of content (e.g., forms, guides) for clarity and accessibility.
  • Interaction patterns:
    Defined ways users interact with elements like buttons, menus, and search bars, creating consistent user experience.
  • API (Application Programming Interface) patterns:
    Standardized ways for different systems to communicate, enabling smooth data exchange.

The DTAC requires suppliers to use common components and patterns in the development of their product. The supplier uses common components and patterns in their product.

Examples of these components and patterns are:

  • Content design patterns:
    Templates for structuring different types of content (e.g., forms, guides) for clarity and accessibility.
  • Interaction patterns:
    Defined ways users interact with elements like buttons, menus, and search bars, creating consistent user experience.
  • API (Application Programming Interface) patterns:
    Standardized ways for different systems to communicate, enabling smooth data exchange.
Working towards it
Multidisciplinary skilled team
5w answer

The DTAC requires suppliers to ensure their team contains multidisciplinary skills, as a team with diversity of expertise and perspectives is more likely to come up with the best solution.

As part of the DTAC submission, the supplier should be able to show that their team:

  • Is a multidisciplinary team that will help them achieve what they need to in each phase of development;Is co-located as far as possible;
  • Includes people with expertise in how services are delivered across all the relevant channels, and the back end systems the service will need to integrate with;
  • Has access to the specialist expertise it needs (for example clinical, legal or policy expertise, from inside or outside the organisation);
  • Will help the supplier deal with what they believe are their riskiest assumptions.

The supplier does not have a multidisciplinary team.

The DTAC requires suppliers to ensure their team contains multidisciplinary skills, as a team with diversity of expertise and perspectives is more likely to come up with the best solution.

As part of the DTAC submission, the supplier should be able to show that their team:

  • Is a multidisciplinary team that will help them achieve what they need to in each phase of development;Is co-located as far as possible;
  • Includes people with expertise in how services are delivered across all the relevant channels, and the back end systems the service will need to integrate with;
  • Has access to the specialist expertise it needs (for example clinical, legal or policy expertise, from inside or outside the organisation);
  • Will help the supplier deal with what they believe are their riskiest assumptions.

The supplier has a multidisciplinary team.

Working towards it
Agile ways of working
5x answer

The supplier does not use agile ways of working in the development of their product. In order to fulfil the DTAC requirements, the supplier should use agile ways of working.

The most common form of agile working is using scrum:

  • A product owner makes a prioritised features list known as a product backlog.
  • The scrum team takes one small piece of the top of the features list, called a sprint backlog, and plans to implement it.
  • The team completes their sprint backlog task in a sprint (a 2-4 week period).
  • They assess progress in a meeting called a daily scrum.
  • At the sprint’s end, the team closes the sprint with a review and demo, then starts a new sprint.

The NHS provides more guidance on agile ways of working here.

The supplier uses agile ways of working in the development of their product. In order to fulfil the DTAC requirements, the supplier should use agile ways of working.

The most common form of agile working is using scrum:

  • A product owner makes a prioritised features list known as a product backlog.
  • The scrum team takes one small piece of the top of the features list, called a sprint backlog, and plans to implement it.
  • The team completes their sprint backlog task in a sprint (a 2-4 week period).
  • They assess progress in a meeting called a daily scrum.
  • At the sprint’s end, the team closes the sprint with a review and demo, then starts a new sprint.

The NHS provides more guidance on agile ways of working here.

Working towards it
Continuous product development
5y answer
Continuous development of a product means more than doing basic maintenance, like fixing bugs in code or deploying security patches. It means responding to feedback and changes in user needs and behaviour, clinical evidence and practice, technology and policy.

The supplier does not continuously develop their product.

In order to fulfil the DTAC requirements, the supplier must ensure that they iterate and improve the product throughout its lifetime. That means the supplier should continuously collect user feedback, carry out user validation, and keep track of changes in clinical practice, technology and policy. That way, suppliers can continuously improve their product.
Continuous development of a product means more than doing basic maintenance, like fixing bugs in code or deploying security patches. It means responding to feedback and changes in user needs and behaviour, clinical evidence and practice, technology and policy.

The supplier continuously develops their product.

In order to fulfil the DTAC requirements, the supplier must ensure that they iterate and improve the product throughout its lifetime. That means the supplier should continuously collect user feedback, carry out user validation, and keep track of changes in clinical practice, technology and policy. That way, suppliers can continuously improve their product.
Working towards it
Benefits case
5z answer
The supplier doesn't yet have a benefits case that includes their objectives and the benefits the supplier will be measuring, or the metrics that they will be tracking.

In order to fulfil the DTAC requirements, suppliers should define what success looks like and be open about how their service is performing.

A benefits case is a document which considers not just the cost but also use, usability and clinical benefit of their product. In this document, the supplier should identify not only the benefits but also potential negative impact, inappropriate use or unintended consequences.

The UK government provides guidance on measuring the benefits of a product here.
The supplier has a benefits case that includes their objectives and the benefits the supplier will be measuring, or the metrics that they will be tracking.

In order to fulfil the DTAC requirements, suppliers should define what success looks like and be open about how their service is performing.

A benefits case is a document which considers not just the cost but also use, usability and clinical benefit of their product. In this document, the supplier should identify not only the benefits but also potential negative impact, inappropriate use or unintended consequences.

The UK government provides guidance on measuring the benefits of a product here.
Working towards it
NHS Cloud First Strategy
5aa answer

The supplier's product does not meet the NHS Cloud First Strategy.

The NHS Cloud First Strategy means digital services should prioritise public cloud solutions unless specific reasons prevent it.

The strategy highlights the potential benefits of cloud computing, including:

  • Flexibility and scalability:
    Cloud enables easy adaptation to changing demands and service growth.
  • Cost-effectiveness:
    Public cloud solutions can be more cost-efficient compared to traditional on-premise infrastructure.
  • Sustainability:
    Cloud can potentially offer lower environmental impact through efficient resource utilisation.
  • Faster innovation:
    Cloud facilitates rapid development and deployment of new digital services.Use a public cloud provider to host your infrastructure and data to ensure you meet this DTAC requirement.

You can find details of the Cloud First Strategy here.

The supplier's product meets with the NHS Cloud First Strategy. This is a DTAC requirement because cloud computing has a number of benefits:

  • Flexibility and scalability:
    Cloud enables easy adaptation to changing demands and service growth.
  • Cost-effectiveness:
    Public cloud solutions can be more cost-efficient compared to traditional on-premise infrastructure.
  • Sustainability:
    Cloud can potentially offer lower environmental impact through efficient resource utilisation.
  • Faster innovation:
    Cloud facilitates rapid development and deployment of new digital services.Use a public cloud provider to host your infrastructure and data to ensure you meet this DTAC requirement.

You can find details of the Cloud First Strategy here.

Not applicable
NHS Internet First Policy
5ab answer

The supplier's product does not meet the NHS Internet First Policy.

The Internet First policy states that all new health and social care digital services should be internet facing and existing services should be changed to be made available over the internet as soon as possible.

The benefits of publishing digital services on the internet include:

  • Easier access to digital health and social care services, including remote working;
  • It makes it easier for different digital services to work together;
  • Increased innovation by improving accessibility to other digital service providers;
  • Simpler connections for health and care organisations;
  • New NHS and social care centres, such as field hospitals, can be set up more quickly.


You can find details of the Internet First Policy here.

The supplier's product meets with the NHS Internet First Policy. This is a DTAC requirement because products being internet facing has a number of benefits:

  • Easier access to digital health and social care services, including remote working;
  • It makes it easier for different digital services to work together;
  • Increased innovation by improving accessibility to other digital service providers;
  • Simpler connections for health and care organisations;
  • New NHS and social care centres, such as field hospitals, can be set up more quickly.


You can find details of the Internet First Policy here.

Not applicable
Single Sign On
5ac answer
The supplier's product does not provide Single Sign On (SSO). Primary Care best practice strongly favours a solution that provides SSO to improve usability.
The supplier's product provides Single Sign On (SSO). Primary Care best practice strongly favours a solution that provides SSO to improve usability.
Smart Card sign-in
5ad answer
The supplier's product does not provide the option of signing in using a Smart Card. Primary Care best practice strongly favours a solution that provides the option to log in using a smart card to improve usability.
The supplier's product provides the option of signing in using a Smart Card. Primary Care best practice strongly favours a solution that provides the option to log in using a smart card to improve usability.
NHS email address sign-in
5ae answer
The supplier's product does not provide the option of signing in using a Smart Card. Primary Care best practice strongly favours a solution that provides the option to log in using a smart card to improve usability.
The supplier's product provides the option of signing in using a Smart Card. Primary Care best practice strongly favours a solution that provides the option to log in using a smart card to improve usability.
Primary care clinical systems (EMIS / Systm1) integration
5af answer
The supplier's product does not provide the option of integrating with primary care clinical systems such as EMIS or Systm1. Primary Care best practice strongly favours a solution that provides the option to integrate with primary care clinical systems to improve usability.
The supplier's product provides the option of integrating with primary care clinical systems such as EMIS or Systm1. Primary Care best practice strongly favours a solution that provides the option to integrate with primary care clinical systems to improve usability.
Clinical Risk Management
6A ANSWER
The supplier does not have a formal Clinical Risk Management System in place that complies with DCB0129.
The supplier has a formal Clinical Risk Management System in place.
offline_bolt
AI analysis
Clinical safety case
6C ANSWER
The supplier does not have a Clinical Safety Case in place that complies with DCB0129.
The supplier has a Clinical Safety Case.
offline_bolt
AI analysis
Clinical hazard log
6e ANSWER
The supplier does not have an up to date Hazard Log in place that complies with DCB0129.
The supplier has provided evidence of their Hazard Log.
offline_bolt
AI analysis
Clinical Safety Officer (CSO)
6g ANSWER
The supplier does not have a defined Clinical Safety Officer.
The supplier has a defined Clinical Safety Officer (CSO).
CHECK_CIRCLE
Verified
-
Medicines and Healthcare products Regulatory Agency (MHRA) registration
6i ANSWER
The solution has not been registered with the MHRA.
The solution has stated they are registered with the MHRA.
CHECK_CIRCLE
Verified
We have verified the registration of Healthtech-1 on the MRHA database
The supplier has indicated that the product is registered with the MHRA.
cancel
Unverified
Unable to verify the registration of Healthtech-1 on the MHRA database
Medical purpose
6j ANSWER
The solution is not registered with the MHRA but does have a medical purpose.
The solution is not registered with the MHRA and does not have a medical purpose.
Working in combination with one or more devices
6k answer
The solution is not registered with the MHRA but does have a medical purpose. It is likely that the solution must be registered with the MHRA in order to conform to the Medical Device Regulation.
The solution is not registered with the MHRA, does not have a medical purpose and does not work in combination with one or more medical devices.
Function as an accessory
6l answer
The solution is not registered with the MHRA, does not have a medical purpose but does work in combination with one or more medical deivces. It is likely that the solution must be registered with the MHRA in order to conform to the Medical Device Regulation.
The solution has not been registered at the MHRA, does not have a medical purpose, does not work in combination with one or more medical devices and does not enable the function of a medical device.Since the product does not have a medical purpose and does not work in combination with one or more medical devices, nor enables the function of a medical device, it likely does not fall under the definition of a medical device and therefore does not have to be registered at the MHRA.
1
Information Security & Privacy
2
Interoperability
3
Usability & Accessability
4
Clinical
Companies House
Verified
Unverified
GDPR
82%
DSPT
88%
DTAC
90%
DCB0129
Cyber Essentials
100%