DTAC Report

RUMI Medtech Limited

Product:
Remcare
Product Type:
Software as a Service (SaaS)
Country:
United Kingdom

46

Overall Score
Clinical Safety
Score: 6/8
Interoperability Criteria
Score: 8/8
Data Protection
Score: 6/6
Usability & Accessibility
Score: 20/20
Technical Security
Score: 6/6
3a. Do you have a formal clinical risk management system in place that complies with DCB 0129?
1 YES
You have a formal clinical risk management system in place that complies with DCB 0129. That's great!

As you know, the clinical risk management system is aimed at providing the NHS with enough information about your digital health product, for them to complete their own counterpart DCB 0160 documentation. Ensure that your DCB 0129 documents are continuously up to date and reflect any changes to your product throughout its lifetime, or new requirements from existing or new customers.

Check that your Clinical Risk Management System is aligned to the NHS example here.
The DCB0129 standard applies to organisations that are responsible for the development and maintenance of health IT systems. A health IT system is defined as ‘“product used to provide electronic information for health and social care purposes”.

You can access the DCB 0129 standard here.

DCB 0129 requires developers to have a Clinical Risk Management System in place and to provide evidence that your Clinical Risk Management System is compliant with DCB 0129.

Your Clinical Risk Management System should include:
  • The clinical risk management governance arrangements that are in place
  • The clinical risk management activities;- Clinical safety competence and training;
  • Audits
You can download an example Clinical Risk Management System from the NHS here and use this as a template to set up your own Clinical Risk Management System document. DCB 0129 is a strict requirement of the DTAC and your DTAC will not be accepted without accurate documentation proving compliance with DCB 0129. It is a very common area for innovators to get wrong, as it is highly specific to your organisation and product. Keep in mind that the NHS organisation that will be using your product will need to produce a counterparty to your DCB 0129, which is called the DCB 0160. In order for them to complete their DCB 0160 documentation, they will need your DCB 0129 documentation as input.
3b. Have you defined a clinical safety case?
1 YES
You have a Clinical Safety Case in place already, that's great!

Make sure your Clinical Safety Case Report is aligned with the example given by the NHS here.

Make sure that you do not provide the hazard log in the body of the safety case report.

This should be provided separately, but you should include:
  • A summary of the product and its intended use
  • A summary of clinical risk management activities
  • A summary of hazards identified which you have been unable to mitigate to as low as it is reasonably practicable
  • A clear identification of hazards which will require user or commissioner action to reach acceptable mitigation (for example, training and business process change
You don't yet have a defined clinical safety case.

As part of your DTAC submission, you must provide a comprehensive Clinical Safety Case Report that should include:
  • A summary of the product and its intended use
  • A summary of clinical risk management activities
  • A summary of hazards identified which you have been unable to mitigate to as low as it is reasonably practicable
  • A clear identification of hazards which will require user or commissioner action to reach acceptable mitigation (for example, training and business process change
The Clinical Safety Case should show that a system is safe for a certain purpose in a certain place at a certain time of the products lifecycle, using the evidence and reasons that back it up. It should tell the reader what you know about the clinical risks of the product at that time of the life cycle.

You should include:
  • A short and clear story of how you checked the clinical safety of the product
  • A summary of what you found out from the check methods you used
  • A clear list of any clinical risks that are still there and the related rules and limits that you have to follow
  • A clear list of any dangers and related clinical risks that you moved to somewhere else, along with any actions you said you will take to control the risks, that have to be dealt with as part of the clinical risk management process in the place where the product is used
  • A list of things that are not fixed yet / problems that may make the product less safe
You should not provide the hazard log in the body of the safety case. This should be provided separately (see next question).

You can download an example of a Clinical Safety Case from the NHS here.
3c. Do you maintain an up-to-date clinical hazard log?
1 YES
You already maintain an up-to-date hazard log, that's great!

The NHS provides guidance on the requirements for a hazard log (which you can download here).

Make sure the headings in your hazard log are the same as the headings in the template hazard log that the NHS provides. It is vital that you maintain this hazard log throughout the entire lifecycle of your product. Your customer may ask to see the hazard log whenever there is any change to your product or the way the product is used.
You don't maintain an up-to-date clinical hazard log.

A clinical hazard log is a formal document used in healthcare settings to identify, track, and manage potential risks associated with medical devices, procedures, or systems. It serves as a vital tool for ensuring patient safety by proactively addressing and mitigating hazards before they can cause harm.

Starting with your hazard log in an early stage of product development is a good idea, as the process is iterative. As your product changes, so will your thinking about the hazards that might arise. Therefore, maintaining an up-to-date clinical hazard log is essential, as new risks (hazards) will rear their heads during your product lifetime, and you may not have considered those from the very beginning.

The NHS provides guidance on the requirements for a hazard log (which you can download here).  

Follow the guidance from the NHS (which you can download here ), making sure the headings in your hazard log are the same. The hazard log is arguably the most important part of your DCB 0129 and subsequently your DTAC submission. You should give a summary to the of the hazards that you could not reduce (or 'mitigate') far enough. You should also clearly point out the hazards that may need user or customer input in order to reduce the hazard to an acceptable level. You can download an example hazard log here (https://digital.nhs.uk/services/clinical-safety/documentation#clinical-risk-management).Your customer may ask to see the hazard log whenever there is any change to your product or the way the product is used.
3d. Do you have a defined Clinical Safety Officer (CSO)?
1 YES
You already appointed a Clinical Safety Officer (CSO), that's great!

Ensure that your CSO maintains their professional body registration and that they regularly review all evidence which together constitutes your Clinical Risk Management System. In particular, the CSO should be heavily involved in creating and checking your hazard log. If there are any major changes to your product, or if an incident occurs, you must engage your CSO.
You have not appointed a defined Clinical Safety Officer (CSO).

You have to appoint a Clinical Safety Officer to sign off your Clinical Safety Case and attest that you have taken the necessary steps to reduce the clinical risks identified in your hazard log to an acceptable level.

The Clinical Safety Officer can be an employee or a third-party contractor. They must have a number of skills and qualifications.

Below are the requirements that a CSO must fulfil:
  • Be a suitably qualified and experienced clinician
  • Hold a current registration with an appropriate professional body relevant to their training and experience
  • Be knowledgeable in risk management and its application to clinical domains
  • Be suitably trained and qualified in risk management or have an understanding in principles of risk and safety as applied to Health IT
  • Have completed appropriate training with the NHS, which you can find more information about here.
  • Depending on the complexity of your product, you can expect the CSO to be spending up to twelve days per year performing their work
3e. Is your product registered with the Medicines and Healthcare products Regulatory Agency (MHRA)?
1 YES
Your product is already registered with the MHRA. Make sure you keep an eye out for any changes to the MHRA requirements, as they have recently been changed.

The changes have specifically been around the acceptance of EU MDR standards.

You can find more information here.
Your product is not registered with the MHRA. If your product has a medical purpose it is likely that you need to register your product with the MHRA and demonstrate MDR compliance before it can be sold in the UK. You can find the relevant guidance for your product under the next question.
3f. Does your product have a medical purpose?
Your product has not been registered at the MHRA and does not have a medical purpose.

Since your product does not have a medical purpose, it likely does not fall under the definition of a medical device and therefore does not have to be registered at the MHRA.

Should your product change in a way that it does involve a medical purpose, or your product is aimed at supporting a medical device or product that does have a medical purpose, you may still fall under the definition of medical device and must register at the MHRA.

The MHRA has detailed guidance, with an interactive decision tree, here.

You can contact the MHRA directly to determine if your product requires UK MDR compliance, and if it does, at what level here.
Your product has not been registered with the MHRA but it does have a medical purpose.

Since your product has a medical purpose, it is likely that you need to register your product with the MHRA and demonstrate MDR compliance before it can be sold in the UK.

The MHRA has detailed guidance, with an interactive decision tree, here.

You can contact the MHRA directly to determine if your product requires UK MDR compliance, and if it does, at what level here.
3g. Does your product work in combination with one or more devices?
Your product has not been registered at the MHRA, does not have a medical purpose, and does not work in combination with one or more medical devices.

Since your product does not have a medical purpose and does not work in combination with one or more medical devices, it likely does not fall under the definition of a medical device and therefore does not have to be registered at the MHRA.

Make sure you regularly review your product and its use cases, as well as any changes to your product, to ensure you do not require UK MDR in the future.  

The MHRA has detailed guidance, with an interactive decision tree, here.

You can contact the MHRA directly to determine if your product requires UK MDR compliance, and if it does, at what level here.
Your product has not been registered at the MHRA, does not have a medical purpose, but works in combination with one or more medical devices.

Since your product does not have a medical purpose but does work in combination with one or more medical devices, it likely falls under the definition of a medical device and therefore has to be registered at the MHRA.

The MHRA has detailed guidance, with an interactive decision tree, here.

You can contact the MHRA directly to determine if your product requires UK MDR compliance, and if it does, at what level here.
3h. Does your product enable the function of a device (is an accessory)?
Your product has not been registered at the MHRA, does not have a medical purpose, does not work in combination with one or more medical devices and does not enable the function of a medical device.

Since your product does not have a medical purpose and does not work in combination with one or more medical devices, nor enables the function of a medical device, it likely does not fall under the definition of a medical device and therefore does not have to be registered at the MHRA.

Make sure you regularly review your product and its use case to ensure you do not require UK MDR.

The MHRA has detailed guidance, with an interactive decision tree, here.

You can contact the MHRA directly to determine if your product requires UK MDR compliance, and if it does, at what level here.
Your product has not been registered at the MHRA, does not have a medical purpose, does not work in combination with one or more medical devices, but enables the function of a medical device.

Since your product does not have a medical purpose on its own, but enables the function of another medical device, it is likely that you need to register your product with the MHDA and demonstrate MDR compliance before it can be sold in the UK.

The MHRA has detailed guidance, with an interactive decision tree, here.

You can contact the MHRA directly to determine if your product requires UK MDR compliance, and if it does, at what level here.
3i . Do you use or connect to any third-party products?
1 NO
Your product does not connect to or use any third-party products. If that changes in the future, you must ensure that these third party products also meet the NHS requirements for DTAC.
Your product connects to third-party products. You need to comply with the NHS and GDPR requirements. Find guidance under the following questions.
3j. Have you gone through a risk management process to ensure the third party is conformant with NHS and GDPR requirements?
Your product connects to or uses third party products and you have gone through a risk management process to ensure this third party complies with NHS and GDPR requirements. That's great!

In your Clinical Risk Management Documentation, you must include third party connection and thus, they must demonstrably meet the NHS and GDPR requirements as well.

If your product changes and starts using new or different third party products, you must ensure that you go through the same risk management process with these new providers as well.
Your product connects to or uses third party products, but you have not gone through a risk management process to ensure this third party complies with NHS and GDPR requirements.

In order to be compliant with DTAC yourself, you must ensure that any third party products meet the NHS requirements as well and conform to the UK GDPR.

In your Clinical Risk Management Documentation, you must include third party connection and thus, they must demonstrably meet the NHS and GDPR requirements as well.

A way to find out whether the third parties that you connect to or use in your product are in fact compliant is through questionnaires, requesting them to provide you with evidence, or requesting to receive their third-party certifications and attestations.
4a. Is your organisation registered with the Information Commissioners Office (ICO)?
1 YES
You are already registered at the ICO, that's great!

Make sure to renew this registration each year, or set up a direct debit with the ICO, which means you don't have to remember to renew (and you get a £5 discount!).
All organisations in the UK that "process" "data" should be registered with the ICO. Processing means carrying out any action related to data, including collecting, storing, amending, consulting, sharing, transferring, etc.. Data in the meaning of the UK GDPR is related to "personally identifiable data", which means information that can be directly or indirectly linked to an individual person.

Registering with the ICO can be done here, and will require the payment of a fee ranging from £40 to £2900 annually, depending on the size and turnover of your organisation
  • Tier 1 – £40
    Micro organisations
    You have a maximum turnover of £632,000 for your financial year or no more than 10 members of staff.
  • Tier 2 – £60
    Small organisations
    You have a maximum turnover of £36 million for your financial year or no more than 250 members of staff.
  • Tier 3 – £2,900
    Large organisations
    If you do not meet the criteria for tier 1 or tier 2, you are placed in tier 3. We regard all controllers as eligible to pay a fee in tier 3 unless and until they tell us otherwise.
4b. Do you have a nominated Data Protection Officer (DPO)?
1 YES
You already appointed a Data Protection Officer, that's great!

Ensure that the DPO is able to carry out their tasks independently and that no conflict of interest arises. Whether a conflict of interest exists is determined on a case by case basis, but will usually arise if the same person has the role of the DPO and is responsible for determining how and why what data is processed by the organisation.
A Data Protection Officer may be a staff member or may be contracted externally on the basis of a service contact. A DPO can be an individual or an organisation.

Not all organisations need to officially appoint a Data Protection Officer. You need to appoint a Data Protection Officer if:
  • You are a public authority or body (except for courts acting in their judicial capacity)
  • Your core activities require large scale, regular and systematic monitoring of individuals (for example, online behaviour tracking)
  • Your core activities consist of large scale processing of special categories of data or data relating to criminal convictions and offences
Most organisations that process some form of health or medical data as a core element of their product will need to appoint a DPO. The most common reason for organisations providing digital health technologies to have a DPO is due to the core activities involving processing health data (being a special category).

Please consult this ICO checklist to review whether you need a DPO.

The DPO assists the company in all issues relating to the protection of personal data. In particular, the DPO must:
  • Inform and advise the controller or processor, as well as their employees, of their obligations under data protection law
  • Monitor compliance of the organisation with all legislation in relation to data protection, including in audits, awareness-raising activities as well as training of staff involved in processing operations
  • Provide advice where a DPIA has been carried out and monitor its performance
  • Act as a contact point for requests from individuals regarding the processing of their personal data and the exercise of their rights
  • Cooperate with DPAs and act as a contact point for DPAs on issues relating to processing
The DPO must be able to carry out their tasks independently, meaning that a conflict of interest must not arise. Whether a conflict of interest exists is determined on a case by case basis, but will usually arise if the same person has the role of the DPO and is responsible for determining how, why and what data is processed by the organisation.

If you do not need to appoint a DPO, the NHS will ask you to attach the completed self-assessment (from the ICO checklist linked above) showing the outcome from the Information Commissioner and your responses which support this determination to your DTAC submission.
4c. Does your product have access to any personally identifiable data or NHS-held patient data?
YES
Your product does not have access to any personally identifiable data or NHS-held patient data.

If your product will process personally identifiable data in the future, you must ensure that you both architect your system in such a way that ensures you meet your obligations to the NHS and the UK GDPR and produce all necessary documentation required.
Your product does process personally identifiable data or NHS-held patient data.

You you must ensure that you both architect your system in such a way that ensures you meet your obligations to the NHS and the UK GDPR.
4d. Have you completed a Data Protection Impact Assessment (DPIA) for your product?
1 YES
Your product has access to personally identifiable or NHS-held patient data. You have already carried out a Data Protection Impact Assessment (DPIA) for your product, that's great!

Make sure that you carry out a new DPIA for each new type of processing that your organisation is considering to undertake.

Ensure that your DPIA's have the following elements:
  • Description of the nature, scope, context and purposes of the processing
  • Assessment of the necessity, proportionality and compliance measures
  • Identification and assessment of risks to individuals
  • Identification of any additional measures to mitigate those risks
Your product has access to personally identifiable or NHS-held patient data. That means you must carry out a Data Protection Impact Assessment (DPIA) for your product.

A DPIA is a process to go through whenever a new way of processing personal data is being employed or considered by your organisation. You can carry out a DPIA for a certain product, process, supplier, or even for the third-party apps that you are thinking about using.

DPIA's must be carried out prior to the start of the particular processing activity you're going to carry out a DPIA for. DPIA's only have to be carried out if it is likely that the processing will result in a high risk for the people (data subjects) involved. The determination whether a certain type of processing is likely to result in a high risk for the people involved is up to your organisation, but it is good practise to carry out a DPIA for any project that involves processing medical or health data. As part of DTAC, the NHS requires you to submit your DPIA for review.

The DPIA must have the following elements:
  • Description of the nature, scope, context and purposes of the processing
  • Assessment of the necessity, proportionality and compliance measures
  • Identification and assessment of risks to individuals
  • Identification of any additional measures to mitigate those risks
4e. Are you compliant (having standards met or exceeded status) with the annual Data Security and Protection Toolkit Assessment (DSPT)?  
1 YES
You are already compliant with the DSPT, that's great!

You must ensure that you carry out this online self-assessment on an annual basis. The deadline for the Data Security and Protection Toolkit is 30th June 2024.

In order to view the NHS' assessment criteria for the DSPT, please download the NHS guidance here.

Here is also a useful guidance document on the roles and responsibilities that are necessary to assign as part of the DSPT requirements.
One of the elements of the DTAC is that the organisation must have met or exceeded the DSPT requirements. The DSPT is an online self-assessment tool employed by the NHS to assess their suppliers on their information security and privacy posture. The DSPT must be submitted each year.

If you have not completed the current year's assessment and the deadline has not yet passed, The NHS asks you to confirm (as part of your DTAC submission) that you intend to complete this ahead of the deadline and that there are no material changes from your previous years submission that would affect your compliance. The deadline for the Data Security and Protection Toolkit is 30th June 2024.

In order to find out more about the requirements of the DSPT, please consult Naq's blog here.

In order to view the NHS' assessment criteria for the DSPT, please download the NHS guidance here.

Here is also a useful guidance document on the roles and responsibilities that are necessary to assign as part of the DSPT requirements.
4f. Have your risk assessments, access controls and system-level security policies been signed off by your DPO?
1 NO
Your DPO (or another responsible individual if you don't need to appoint a DPO) has signed off on your risk assessments, access control measures and system-level security policies, that's great!

Make sure that your DPO or the other responsible individuals reviews your risk assessments, controls and policies at least annually.
Your answer to the question whether your organisation has a nominated DPO may have been no, or may have been "we don't need one". If you fall within the latter category, another responsible individual may be appointed instead of a DPO.

Your DPO or another responsible individual is responsible for signing off on your risk assessments, access controls and system-level security policies.

An information security risk assessment must be carried out by your organisation, considering the risks that may lead to a cyber incident or data breach. This is similar to your hazard log, where you consider hazards (and accidents) that might have an impact on patient safety or health, whereas an information security risk assessment only considers those risks that impact the confidentiality, integrity or availability of data.

Access controls are the measures implemented on your product and other systems in use in your organisation to ensure that unauthorised users do not get access to your systems and the data contained thereon. Examples include role based access, multifactor authentication and logging and reviewing access attempts.

System-level security policies are policies which describe how the security and confidentiality of specific systems are maintained within your organisation. For instance, if you use a third party (cloud) hosting provider, you will need to create a system-level security policy specific for that hosting provider, detailing how you are ensuring that this system remains security and the confidentiality of data is protected.

Make sure that your DPO reviews these risk assessments, controls and policies at least annually.
4g. Do you store data outside of the UK?  
1 NO
You don't store any data outside of the UK. This is the best case scenario when supplying your product to the NHS.

Make sure that you are not unwittingly sending data to other countries by making use of third party products or suppliers that are headquartered outside of the UK and have a privacy policy clause stating that they may share data within their group, which may include sharing data outside of the UK. This is common practice with hosting providers such as AWS or Azure.
You store data outside of the UK.

You must be sure these countries provide adequate data protection for British citizens or residents.
4h. Do all of these countries have an adequacy decision with the UK, to ensure the protection of data per the UK GDPR?  
You store data outside of the UK and you have ensured that the countries that you send data to are covered by an adequacy decision. That's great!

Make sure that when you use new suppliers or third party products that store data outside of the UK, their location is checked.

Also make sure that you are not unwittingly sending data to other countries by making use of third party products or suppliers that are headquartered outside of the UK and have a privacy policy clause stating that they may share data within their group, which may include sharing data outside of the UK. This is common practice with hosting providers such as AWS or Azure.
You store data outside of the UK but these countries do not ensure adequate protection for British citizens or residents, or you are not sure if they do.

Best practise when supplying your product to the NHS is that all data remains within the UK. In the edge cases that data does leave the UK, you are responsible for ensuring that this data is transferred to areas covered by similar data protection legislation as in the UK, which will have been determined by the UK government through so called 'Adequacy Decisions'.

An Adequacy Decision is a decision by the UK government (or the European Union Commission and referred to by the UK government) that determines that a certain country or area provides 'adequate protection' for British citizens or residents from a data protection perspective.

You may only transfer data outside of the UK if you are transferring data to organisations located in a country or an area that is covered by an adequacy decision.

The list of countries for which an adequacy decision exists can be found here.

Make sure you consult this list and ensure that your suppliers or third party products are either covered by an adequacy decision, or that you choose an alternative supplier or third party app.

Also make sure that you are not unwittingly sending data to other countries by making use of third party products or suppliers that are headquartered outside of the UK and have a privacy policy clause stating that they may share data within their group, which may include sharing data outside of the UK. This is common practice with hosting providers such as AWS or Azure.
5a. Do you have a valid Cyber Essentials certificate?
1 YES
You hold a valid Cyber Essentials Certificate, that's great!

Make sure that you renew your Cyber Essentials certificate in plenty of time before it expires, as you cannot submit your DSPT, which is part of the DTAC requirements, without a valid Cyber Essentials certificate.
You do not have a valid Cyber Essentials Certificate.

All NHS suppliers must hold a valid Cyber Essentials certificate which was issued within the last 12 months.

Cyber Essentials is controlled by the National Cyber Security Centre (NCSC) and certificates are issued and managed by IASME. Cyber Essentials ensures your organisation (not just your product) meets the minimum requirements of information security against five areas:
  • Firewalls
  • Secure configuration
  • Security update management
  • User access control
  • Malware protection
If you are unsure if you meet the requirements of Cyber Essentials, there is a free readiness assessment you can complete here.

You can apply for the self assessment version of Cyber Essentials here.

Please note that there are maximum prices you should pay for Cyber Essentials so ensure you are not being overcharged if you choose to obtain Cyber Essentials via a Certification Body. It is imperative that somebody from your organisation that has responsibility for your IT security completes Cyber Essentials. It cannot be completed by a third party organisation or consultant.

You may need to obtain Cyber Essentials Plus. Cyber Essentials Plus provides greater assurance than Cyber Essentials by your IT systems being independently verified by a security expert. You should speak with your customer about the need for you to have Cyber Essentials Plus. If your product introduces higher levels of risk to the NHS, you may be required to demonstrate this higher level of assurance. You can expect Cyber Essentials Plus to cost around £1500.

Both Cyber Essentials and Cyber Essentials Plus require annual recertification.
5b. Have you completed a penetration test of your product within the past twelve months?
1 YES
You have completed a penetration test of your product within the last 12 months.

Before submitting DTAC, ensure the penetration test was carried out by a qualified penetration tester. It is not acceptable to submit the output of a vulnerability scan in lieu of a penetration test.

The penetration test must map all findings against the OWASP Top 10 as a minimum. You cannot have any vulnerabilities in the report that you submit to your NHS customer with a CVSS score of over 7.0. If a vulnerability is discovered with a CVSS score greater than 7.0, you must fix that vulnerability and you must carry out another penetration test. Ensure that all findings from the penetration test report are taken into consideration in your security risk assessment and hazard log.

Ensure your annual re-test is carried out with enough time before to allow time for you to fix any vulnerabilities and perform a re-test, if required.
You have not yet carried out a penetration test of your product.

Annual penetration testing of your product is part of the DTAC requirements. This penetration test must be carried out by a qualified penetration tester. It is not acceptable to submit the output of a vulnerability scan in lieu of a penetration test.

The penetration test must map all findings against the OWASP Top 10 as a minimum. You cannot have any vulnerabilities in the report that you submit to your NHS customer with a CVSS score of over 7.0. If a vulnerability is discovered with a CVSS score greater than 7.0, you must fix that vulnerability and you must carry out another penetration test. Ensure that all findings from the penetration test report are taken into consideration in your security risk assessment and hazard log.

When looking for a penetration tester, we recommend that you look for those that are approved by CREST.

A typical innovator going through the NIA can expect to pay around £5000 for a penetration test, but this can vary greatly depending on the complexity of your product. If your product contains a hardware component, you can expect to pay more.
5c. Has your source code undergone a source code security review?
1 YES
Your source code has undergone a source code security review.

It is important to remember that, whilst an internal source code review is acceptable, it is preferred that your source code has been reviewed by a qualified third party. Most penetration testing companies can perform source code security reviews, and it is often a good idea to combine this with your annual penetration test.

If your product is defined as introducing a high level of risk to the NHS, your customer may require you to provide evidence of an independent source code review.

Ensure that any review addresses the recommendations made by the NCSC.
You have not yet carried out a source code security review.

An internal or external custom code security review is part of the DTAC requirements.

This review should be aligned to the guidance from the NCSC and the OWASP Top 10.

Whilst an internal source code review is acceptable, it is preferred that your source code has been reviewed by a qualified third party. Most penetration testing companies can perform source code security reviews, and it is often a good idea to combine this with your annual penetration test. If your product is defined as introducing a high level of risk to the NHS, your customer may require you to provide evidence of an independent source code review.

Key things to look out for when reviewing your source code are hard-coded secrets (such as API keys), out of date open source packages and ensuring all user input is sanitised. You should however read the NCSC guidance for detailed requirements for your source code as referenced above.
5d. Do all privileged accounts in your product and across the organisation have appropriate Multi-Factor Authentication (MFA)?
1 YES
All privileged accounts in your product and across the organisation have appropriate multi-factor authentication.

However, it is now a hard requirement by the NCSC through Cyber Essentials that all user accounts, not just accounts with privileged levels of access (i.e. admin accounts) must have Multi-Factor Authentication (MFA) enabled so ensure that all cloud services (Office 365, Google Workspace, AWS, Azure etc.) have MFA enforced for all users.

You should ensure that all of the online products your organisation and product uses (e.g. Google Workspace, Office 365, Azure, AWS, GCP) have MFA enforced for all users, if available.
Privileged accounts in your product and across the organisation do not have appropriate multi-factor authentication.

It is now a hard requirement by the NCSC through Cyber Essentials that all user accounts, not just accounts with privileged levels of access (i.e. admin accounts) must have Multi-Factor Authentication (MFA) enabled (this is sometimes referred to as Two-Factor Authentication or 2FA).

You can find more about MFA here.

You should ensure that all of the online products your organisation and product uses (e.g. Google Workspace, Office 365, Azure, AWS, GCP) have MFA enforced for all users, if available. There are many forms of MFA that are acceptable including numeric codes generated by a mobile phone app, a code sent to your email, an SMS sent to a mobile phone or a physical device such as a YubiKey.

It is imperative that you enforce MFA for all users, as this is the single most effective way to stop the majority of cyber incidents.
5e. Have you defined and implemented logging and monitoring on your product?
1 YES
You have defined and implementing logging and monitoring on your product.

Ensure that all logs cover a sufficient time frame, to allow for a thorough investigation to be carried out. It is recommended that you keep logs for a minimum of three months.
You have not defined and implemented logging and monitoring on your product. Part of the DTAC requirements is that you define a logging and monitoring plan and that you have implemented this on your product.

Monitoring data could come from event-driven logs, such as website connections, or device configurations details, such as the current operating system version running on a device. You must implement some form of logging and monitoring of your product. The NHS acknowledges that not all developers will have advanced audit capabilities, but a basic form of logging and monitoring is required to ensure you meet your quality, safety and information security obligations.

The level of monitoring you need must be based on the cyber, quality and clinical safety risk associated with your product.

You can find more information about how, and what, to log here.

If your product is hosted on popular cloud platforms, you can easily turn on sufficient levels of logging and monitoring with services such as:
If your product is hosted on a Windows or Linux server (either physical or virtual) then you should ensure your operating system is configured to generate logs, especially web server logs from services such as IIS or Apache, and are being properly stored.

You may also wish to explore open source solutions such as:
Ensure that all logs cover a sufficient time frame, to allow for a thorough investigation to be carried out. It is recommended that you keep logs for a minimum of three months.
5f. Has your product been load tested?
1 YES
Your product has been load tested, that's great!

Ensure that you perform load testing after each new release, especially if there has been a significant change in your product.

It is also recommended that you test your product past its designed tolerances by performing stress testing. Examples of stress testing include adding significantly more users than you expect during normal operations or performing database operations at a rate that far exceeds the designed limits.
Your product has not yet been load tested. To verify that your product can meet its security, availability and performance requirements, the DTAC requires you to ensure it is regularly load tested. It is also recommended that you perform stress testing to take your product past its designed tolerance and capacity.

In your DTAC submission, you must provide evidence that your product has been load tested. What you are testing during a load test is whether your product can meet the expected peak load conditions, for example, the number of concurrently logged-in users or database operations. You must ensure that the results of the load testing satisfy your product requirements.

It is also recommended that you test your product past its designed tolerances by performing stress testing. Examples of stress testing include adding significantly more users than you expect during normal operations or performing database operations at a rate that far exceeds the designed limits. That way, you can see where the boundaries of your product are, which enables you to plan appropriately.

There are several cloud based solutions available such as AWS Distributed Load Testing or Azure Load Testing.
6a. Does your product expose any Application Programme Interfaces (API) or integration channels for other consumers?
YES
Your product does not expose any API's or integration channels for other consumers.

In principle, the DTAC requires you to have API’s that are relevant to the use case for the product, which follow Government Digital Services Open API Best Practice, are documented and freely available and that third parties have reasonable access to connect.

If the product does not have API’s and there is a legitimate rationale for this considering the use case of the product, your customer may accept this rationale.

You must state the reasons why you do not expose any APIs in your DTAC. If you do start to expose any APIs or integration channels in the future, ensure you follow the guidance on API use within the NHS.
Your product exposes APIs or integration channels for consumers.

You must therefore follow the Government Digital Services Open API Best Practice.

You can find the relevant guidance for your product under the next question.
6b. Do these APIs follow the Government Digital Services Open API Best Practice?
1 YES
Your product exposes APIs or integration channels for other consumers, which follow the Open API Best Practice from Government Digital Services. That's great!

As you know, any APIs exposed by your product must follow the best practices set out by the UK Government.

For reference, you can find these best practices here.

Ensure you regularly make yourself aware of any changes to any changes or updates to the GDS guidance. Also, ensure that your product is still compliant if you make any changes to your product.
Your product exposes APIs or integration channels for other consumers, but do not follow the Open API Best Practice from Government Digital Services.

Any APIs exposed by your product must follow the best practices set out by the UK Government.

You can find these best practices here.

The Government Digital Services (GDS) Open API Best Practices are a set of guidelines for designing, building and operating APIs for use in government and public services, including the NHS. They aim to provide consistency, quality and usability for APIs across different platforms and services.

The key requirements of the GDS Open API Best Practices are:
  • Use a design-first approach:
    Plan what the API will do and how it will work before coding, based on user and business needs. Test and iterate the design based on feedback. Check for existing APIs that could be reused or adapted
  • Follow the API technical and data standards: Use the standards that describe how to design, build and operate APIs in a consistent way. They cover aspects such as security, versioning, naming, data formats, error handling, and documentation
  • Use GraphQL for your API:
    Use GraphQL, which is a query language and a set of tools for building APIs with a flexible data schema. It allows users to request only the data they need, and supports multiple formats and protocols
  • Define an API management strategy:
    Define a strategy that covers aspects such as security, monitoring, testing, and governance. Manage your APIs to meet user needs by following the service lifecycle stages: discovery, alpha, beta, and live
  • Document your APIs:
    Document your APIs using clear and concise language, and provide reference documentation for developers. Use tools and frameworks that can generate documentation from the API specification or code. Make sure that the APIs or integration channels your product exposes follow the GDS Open API Best Practice.
6c. Are the APIs documented and freely available?
1 YES
You've ensured that your APIs are documented and freely available, that's great!

Make sure that your documentation remains up-to-date and reflect any changes to either your product, or the APIs.
Your APIs are not documented and freely available. Part of the DTAC requirements is that you provide clear documentation for any APIs you expose and make your APIs freely available.

To address this issue, you need to follow these steps:
  • Document your APIs:
    Documenting your APIs means providing clear and concise information about how to use and integrate with your APIs. Your documentation should include details such as the available endpoints, methods, parameters, headers, data formats, error codes, and examples of requests and responses. You should also provide reference documentation for developers, such as API specifications, user guides, or training materials. You can use tools and frameworks that can generate documentation from the API specification or code, such as Swagger or Postman.
  • Follow the API technical and data standards:
    Use the standards that describe how to design, build and operate APIs in a consistent way. They cover aspects such as security, versioning, naming, data formats, error handling, and documentation
  • Use GraphQL for your API:
    Use GraphQL, which is a query language and a set of tools for building APIs with a flexible data schema. It allows users to request only the data they need, and supports multiple formats and protocols
  • Define an API management strategy:
    Define a strategy that covers aspects such as security, monitoring, testing, and governance. Manage your APIs to meet user needs by following the service lifecycle stages: discovery, alpha, beta, and live
  • Document your APIs:
    Document your APIs using clear and concise language, and provide reference documentation for developers. Use tools and frameworks that can generate documentation from the API specification or code.Make sure that the APIs or integration channels your product exposes follow the GDS Open API Best Practice.
6d. Are the APIs in line with the healthcare standards of data interoperability?
1 YES
Your product exposes Application Programme Interfaces or integration channels for other consumers and the APIs set out the healthcare standards of data interoperability.

If you make any changes to your product, ensure that you update your evidence accordingly to ensure compliance with the appropriate interoperability standard.

Also, ensure that you are aware of any changes to either NHS guidance or changes to standards to ensure your product remains compliant.
Your Product exposes Application Programme Interfaces or integration channels for other consumers but the APIs do not set out the healthcare standards of data interoperability.

As part of the DTAC requirements, developers must set out the healthcare standards of data interoperability e.g., Health Level Seven International (HL7) / Fast Healthcare Interoperability Resources (FHIR) and demonstrate their compliance with these standards to your customer in your DTAC submission.

To address this issue, you need to follow these steps:
  • Understand what the healthcare standards of data interoperability are:
    They are methods for connecting systems and exchanging data across different settings and organisations. They ensure that data is consistent, accurate, and meaningful for users and systems. Some examples are Health Level Seven International (HL7) and  Fast Healthcare Interoperability Resources (FHIR)
  • Implement the healthcare standards of data interoperability in your product:
    You need to follow a systematic and iterative process that involves assessing your current state, defining your target state, planning your transition, executing your transition, and maintaining and evolving your product. You need to align your product with the relevant national and international standards and frameworks, such as the UK Core FHIR Release 4, the NHS Digital Interoperability Handbook, and the NHS Data Strategy.
6e. Do third parties have reasonable access to connect?
1 YES
Third parties have reasonable access to connect to your APIs, that's great!

Ensure that as your product and APIs further develop, third parties still have reasonable access to connect and that you do not introduce unnecessarily complex requirements or restrictions.
Third parties do not have reasonable access to connect to your APIs.

DTAC requires you to ensure that third parties can connect to your APIs without needing to implement unreasonable methods.

To address this issue, you need to follow these steps:
  • Document your APIs:
    Provide clear and concise information about how to use and integrate with your APIs, such as the available endpoints, methods, parameters, headers, data formats, error codes, and examples of requests and responses. You can use tools and frameworks that can generate documentation from the API specification or code, such as Swagger or Postman12
  • Publish your APIs:
    Make your API documentation publicly available and discoverable, so that third parties can easily find and access it
  • Support your APIs:
    Provide ways for third parties to get help and support when using your APIs, such as FAQs, forums, tutorials, or contact details. You can also collect feedback and suggestions from your API users, and use them to improve your API quality and usability
6f. Have you a documented detailed product description and architecture?
1 YES
Ensure your documentation aligns with the NHS architecture principles. In summary, your product should align with the following principles:
  • Deliver sustainable services:
    Consider the environmental, social and economic impact of the service life cycle
  • Put NHS tools in modern browsers:
    Use browser based and open web standards, avoid proprietary or legacy technologies
  • Internet first:
    Use internet standards and protocols, make services available over the public internet by default
  • Public cloud first:
    Move to the public cloud unless there is a clear reason not to, benefit from scalability, security and cost savings
  • Build a data layer with registers and APIs:
    Store data once and share via open APIs, avoid data duplication and inconsistency
  • Adopt appropriate cyber security standards:
    Follow the cyber security standards and guidance, keep software, networks and systems up to date.
  • Use platforms:
    Build upon existing platforms and common capabilities, avoid reinventing the wheel
  • Put user needs first:
    Design services around user needs, use user research, feedback and testing
  • Interoperability with open data and technology:
    Use open data and technology standards, enable interoperability and data sharing across the system
  • Reuse before buy/build:
    Reuse existing solutions before delivering new ones, make new solutions reusable by others
You need to create a detailed product description and architecture that aligns with the NHS architecture principles. Without this, it will be difficult for your customer to understand your product. Your description and architecture should be aligned to the following NHS principles:
  • Deliver sustainable services:
    Consider the environmental, social and economic impact of the service life cycle
  • Put NHS tools in modern browsers:
    Use browser based and open web standards, avoid proprietary or legacy technologies
  • Internet first:
    Use internet standards and protocols, make services available over the public internet by default
  • Public cloud first:
    Move to the public cloud unless there is a clear reason not to, benefit from scalability, security and cost savings
  • Build a data layer with registers and APIs:
    Store data once and share via open APIs, avoid data duplication and inconsistency
  • Adopt appropriate cyber security standards:
    Follow the cyber security standards and guidance, keep software, networks and systems up to date.
  • Use platforms:
    Build upon existing platforms and common capabilities, avoid reinventing the wheel
  • Put user needs first:
    Design services around user needs, use user research, feedback and testing
  • Interoperability with open data and technology:
    Use open data and technology standards, enable interoperability and data sharing across the system
  • Reuse before buy/build:
    Reuse existing solutions before delivering new ones, make new solutions reusable by others
6g. Do you use NHS numbers to identify patient record data?
YES
If your product currently holds, or will hold, patient record data you must ensure you meet all of the NHS requirements around security.
Your product doesn't use NHS numbers to identify patient record data.

If your product will hold patient record data in the future, you must ensure you meet all of the NHS requirements around security.
6h. Do you use the NHS Login to establish a user's verified NHS number?
1 YES
Your product uses NHS numbers to identify patient record data and uses NHS login to establish a user's verified NHS number. That's great!

The NHS provides guidance on NHS Login for partners and developers here.

Make sure you continue to follow NHS Digital Guidance.
Your product uses NHS numbers to identify patient record data but does not use NHS login to establish a user's verified NHS number. If your product uses an NHS number to identify a patient record, you must use NHS login.

If you don't use NHS login to establish a verified NHS number, a legitimate reason for not using NHS login should be provided to your customer in your DTAC submission, alongside the security measures and appropriateness of the methods that you do use.

The NHS provides guidance on NHS Login for partners and developers here.
6i. Do you have clear documentation on the rationale behind not using NHS login to establish a verified NHS number and how you ensure that the login methods are appropriate and secure?
You must ensure your product has implemented security controls commensurate with the protection offered by the NHS login.

You can find more information about NHS Login here.
You must ensure your product has implemented security controls commensurate with the protection offered by the NHS login.

You can find more information about NHS Login here.

You will need to demonstrate these measures clearly in your DTAC file with a justification as to why you have decided not to use the NHS login.
6j. Does your product have the capability for read/write operations with electronic health records (EHRs)?
YES
You need to ensure that you use industry standards for secure interoperability.

See the next question for further guidance.
If your product will connct to EHRs, you need to ensure that you use industry standards for secure interoperability. (e.g. OAuth 2.0, TLS 1.2) or mitigations, methodologies or measures commensurate with these standards.
6k. Do you use industry standards for secure interoperability (e.g. OAuth 2.0, TLS 1.2) or mitigations, methodologies or measures commensurate with these standards when interfacing with EHRs?
1 YES
You must ensure your DTAC file details how your implementation assures that your approach utilises commensurate controls to those offered by standards such as OAuth 2.0 and TLS 1.2.

In summary:
  • Mutual authentication:
    Both parties must verify their identity using non-repudiable methods. For example, OAuth 2.0 allows clients to authenticate with the authorization server using mutual TLS, which is a method of verifying the identity of both parties using X.509 certificates. This prevents unauthorized clients from obtaining access tokens or impersonating legitimate clients. TLS 1.2 also enables the use of TLS extensions, such as Server Name Indication (SNI) or Application-Layer Protocol Negotiation (ALPN), that allow for better performance, compatibility, and flexibility of the protocol.
  • Authorization:
    Clients must obtain delegated access to protected resources using secure methods such as tokens. OAuth 2.0 also allows authorization servers to bind access tokens to the client’s mutual TLS certificate, which means that only the client that obtained the token can use it to access the protected resource1. This prevents token theft or replay attacks by malicious actors.
  • Encryption:
    Sensitive data must be encrypted using strong algorithms to prevent eavesdropping. TLS 1.2 provides a secure channel for the transmission of sensitive data, such as authorization codes, access tokens, user credentials, or API requests and responses. TLS 1.2 also supports stronger encryption algorithms, such as AES, and improved hashing and signing algorithms, such as SHA-256, that are resistant to brute-force attacks or collisions.
  • Integrity:
    Data should be hashed and signed to prevent tampering or modification. OAuth 2.0 and TLS 1.2 both use cryptographic techniques to ensure the integrity of the data and the parties involved. OAuth 2.0 uses digital signatures to verify the authenticity and validity of the access tokens and the authorization server. TLS 1.2 uses message authentication codes (MACs) to verify the authenticity and integrity of the messages exchanged between the client and the server.
Your product has the capability for read/write operations with Electronic Health Records (EHRs) but does not use industry standards for secure interoperability.

In principle, you should use industry standards for secure interoperability. You will be asked to provide more information on which standards you have employed during your DTAC submission. If you do not use any industry standards, you will be asked to provide the rationale, mitigations, methodology and security measures behind the lack of use of interoperability standards.

It is advisable to ensure that your product aligns with the industry standards for secure interoperability as this does not only fulfil the DTAC requirements, but ultimately helps to protect patients as well.

When interfacing with EHRs without using industry standards (such as OAuth 2.0 or TLS 1.2) you must ensure your product is implementing controls commensurate with these industry standards. You must ensure you are implementing the following controls when connecting to EHRs:
  • Mutual authentication:
    Both parties must verify their identity using non-repudiable methods. For example, OAuth 2.0 allows clients to authenticate with the authorization server using mutual TLS, which is a method of verifying the identity of both parties using X.509 certificates. This prevents unauthorized clients from obtaining access tokens or impersonating legitimate clients. TLS 1.2 also enables the use of TLS extensions, such as Server Name Indication (SNI) or Application-Layer Protocol Negotiation (ALPN), that allow for better performance, compatibility, and flexibility of the protocol.
  • Authorization:
    Clients must obtain delegated access to protected resources using secure methods such as tokens. OAuth 2.0 also allows authorization servers to bind access tokens to the client’s mutual TLS certificate, which means that only the client that obtained the token can use it to access the protected resource1. This prevents token theft or replay attacks by malicious actors.
  • Encryption:
    Sensitive data must be encrypted using strong algorithms to prevent eavesdropping. TLS 1.2 provides a secure channel for the transmission of sensitive data, such as authorization codes, access tokens, user credentials, or API requests and responses. TLS 1.2 also supports stronger encryption algorithms, such as AES, and improved hashing and signing algorithms, such as SHA-256, that are resistant to brute-force attacks or collisions.
  • Integrity:
    Data should be hashed and signed to prevent tampering or modification. OAuth 2.0 and TLS 1.2 both use cryptographic techniques to ensure the integrity of the data and the parties involved. OAuth 2.0 uses digital signatures to verify the authenticity and validity of the access tokens and the authorization server. TLS 1.2 uses message authentication codes (MACs) to verify the authenticity and integrity of the messages exchanged between the client and the server.
6l. Is your product a wearable or device, or does it integrate with them?
1 NO
The product is not a wearable or medical device and does not integrate with a wearable or medical device.

The product therefore does not have to comply with ISO/IEEE 11073 Personal Health Data (PHD) standards.
Your product is a wearable or device, or integrates with them, and thus must comply with ISO/IEEE 11073 Personal Health Data (PHD) standards.
6m. Is your product compliant with ISO/IEEE 11073 Personal Health Data (PHD) standards?
The product is a wearable or medical device, or integrates with them, and thus must comply with ISO/IEEE 11073 Personal Health Data (PHD) standards.

Your product is already compliant with ISO/IEEE 11073 Personal Health Data (PHD) standards.

Make sure your product remains compliant by incorporating the requirements throughout any changes to your product.
The product is a wearable or device, or integrates with them, and thus must comply with ISO/IEEE 11073 Personal Health Data (PHD) standards.

Your product is not yet compliant with ISO/IEEE 11073 Personal Health Data (PHD) standards.

The ISO/IEEE 11073 standards set out the requirements for communication between medical, health care and wellness devices and external computer systems. They require developers to take certain measures to ensure that medical, healthcare and wellness devices are interoperable and can exchange data between them efficiently and securely. Some of the overarching principles of the standards are:
  • Interoperability:
    Devices must use defined protocols for communication, enabling them to exchange data seamlessly regardless of manufacturer or technology
  • Data Security and Privacy:
    Mechanisms are employed to ensure only authorized devices and users can access and manage data and data is encrypted
  • Data Integrity and Quality: Mechanisms are implemented to identify and handle potential errors in data transmission and storage
You will need to understand your product in depth to then be able to decide which ISO/IEEE 11073 standard is applicable to your product. For instance:
  • Nomenclature (ISO/IEEE 11073-10101):
    If your device uses standardized medical terminology for data elements, this sub-standard is relevant.
  • Domain information model (ISO/IEEE 11073-102xx):
    This sub-standard defines data structures for specific medical domains (e.g., cardiology, respiratory). Choose the sub-standard that aligns with your device’s data type.
  • Application profiles (ISO/IEEE 11073-104xx):
    These define communication protocols for specific device types or applications. Identify the profile that matches your device’s functionality (e.g., vital signs monitoring, continuous glucose monitoring).
  • Device descriptions (ISO/IEEE 11073-105xx):
    If your device requires a specific description for interoperability, this sub-standard might be relevant.
7a - 7h. Usability criteria met?
1 YES
"Lots of products and services are not useful for users. You need to understand your users and their needs - from their point of view - to build something that helps them. Understanding as much of the context as possible will give you the best chance of meeting users' needs in a simple, cost effective way. The most obvious problem is not always the one that really needs solving. Test your assumptions early and often to reduce the risk of building the wrong thing."

- NHS Guidance on usability

The usability requirements from the DTAC are aimed at ensuring that your product is appropriate for your users and that your product is adequate in solving the problem that it sets out to solve.

To aid the usability of your product, the NHS requires you to:
  • Define your ideal user profile in detail
  • Survey people within the NHS who fit this profile
  • Define the user benefits of your product
  • Validate these assumed benefits with the NHS
  • Develop and document user journeys
  • Engage users in the development of the product
  • Consider user needs and verify with the ideal users throughout the development process
  • Map all key user journeys to ensure that the whole problem is solved or it is clear to users how it fits into their own pathway or user journey
You have carried out the steps that are necessary to ensure that you understand your user needs, the benefits of your product and the user journeys, and have taken this into account in your product development. That's great!

As you go through product iteration, you might change certain elements of the user journey or product features. Make sure you go back to the drawing board when it comes to useability, and do not assume that you have taken user needs into account appropriately when you change an element of your product. Validation should be iterative and you might need a few attempts before getting the full picture.

Guidance on usability is provided by the NHS here:
"Lots of products and services are not useful for users. You need to understand your users and their needs - from their point of view - to build something that helps them. Understanding as much of the context as possible will give you the best chance of meeting users' needs in a simple, cost effective way. The most obvious problem is not always the one that really needs solving. Test your assumptions early and often to reduce the risk of building the wrong thing."

- NHS Guidance on usability

The usability requirements from the DTAC are aimed at ensuring that your product is appropriate for your users and that your product is adequate in solving the problem that it sets out to solve.

To aid the usability of your product, the NHS requires you to:
  • Define your ideal user profile in detail
  • Survey people within the NHS who fit this profile
  • Define the user benefits of your product
  • Validate these assumed benefits with the NHS
  • Develop and document user journeys
  • Engage users in the development of the product
  • Consider user needs and verify with the ideal users throughout the development process
  • Map all key user journeys to ensure that the whole problem is solved or it is clear to users how it fits into their own pathway or user journey
You have not carried out, or are still working towards, some or all of these requirements. In order to pass the usability assessment section of DTAC, all of these requirements must be fulfilled. Make sure that you carry out these steps as appropriate to the stage of your product development lifecycle.

Once you have carried out these steps, it is important to remember: As you go through product iteration, you might change certain elements of the user journey or product features. Make sure you go back to the drawing board when it comes to usability, and do not assume that you have taken user needs into account appropriately when you change an element of your product. Validation should be iterative and you might need a few attempts before getting the full picture.

Guidance on usability is provided by the NHS here:
7i. Do you undertake user acceptance testing to validate the usability of the system?
1 YES
You have already carried out user acceptance testing, that's great!

Make sure to carry out user acceptance testing whenever you have made a change to your product which may have an impact on the way your users might use your product.

The NHS provides guidance on user acceptance testing here.
User Acceptance Testing (UAT) is a crucial part of demonstrating compliance with usability and accessibility requirements. Usability testing helps in ensuring that the product is simple to use, which is especially important when thinking about patient pathways and how products should help patients or other users solve important problems.

The NHS DTAC asks product developers to carry out user acceptance testing. You have not yet carried out user acceptance testing or you're working towards it. Make sure to follow the following principles of user acceptance testing:
  • Clear objectives and test plan:
    Define specific goals for UAT and create a detailed test plan covering key functionalities and workflows.
  • Focus on real users:
    Recruit testers representative of your actual user base (e.g., patients, clinicians, administrators).
  • Multiple testing methods:
    Consider various techniques like walkthroughs, task-based scenarios, observation, and surveys to capture diverse feedback.
  • Accessibility considerations:
    Ensure testing caters to users with disabilities, including screen readers, assistive technologies, and diverse accessibility needs.
  • Data privacy and security:
    Maintain patient data confidentiality and adhere to NHS data protection regulations throughout testing.
7j. Do you provide a Service Level Agreement to all customers purchasing the product?
1 YES
You provide an SLA to all customers purchasing your product, that's great!

As you know, a Service Level Agreement should clearly define your product, set realistic and measurable objectives, and take any customer requirements into account.

Through your SLA, you show that you aim to:
  • Maximise uptime and speed of response for the online part of the service
  • Deploy software changes regularly, without significant downtime
  • Carry out quality assurance testing regularly
  • Test the service in an environment that's as similar to live as possible
  • Have appropriate monitoring in place, together with a proportionate, sustainable plan to respond to problems identified by monitoring (given the impact of problems on users and on the NHS)
  • Actively work towards fixing any organisational or contractual issues which make it difficult to maximise availability (for example, by agreeing a common set of languages, tools, and ways of working for technical staff)
The public, patients and staff need to access NHS services throughout the day and night. If a service is unavailable or slow, it can mean people do not get the help they need. This is why one of the requirements of the DTAC is for developers to provide a Service Level Agreement (SLA) to all customers purchasing the product.

A Service Level Agreement should clearly define your product, set realistic and measurable objectives, and take any customer requirements into account.

Through your SLA, you should show that you aim to:
  • Maximise uptime and speed of response for the online part of the service
  • Deploy software changes regularly, without significant downtime
  • Carry out quality assurance testing regularly
  • Test the service in an environment that's as similar to live as possible
  • Have appropriate monitoring in place, together with a proportionate, sustainable plan to respond to problems identified by monitoring (given the impact of problems on users and on the NHS)
  • Actively work towards fixing any organisational or contractual issues which make it difficult to maximise availability (for example, by agreeing a common set of languages, tools, and ways of working for technical staff)
7k. Do you report to customers on your performance with respect to support, system performance (response times) and availability (uptime) at a frequency required by your customers?
1 YES
Your customers may require you to report on your performance regarding support, system performance and availability.

You report to your customers on your key performance indicators, that's great!

Make sure that your reporting show the results that you have promised in your SLA.
Your customers may require you to report on your performance regarding support, system performance and availability.

Reporting on these topics to your customers is not a hard requirement on the DTAC (half points may be awarded during the assessment for a "no" answer), but it is desirable.

These performance indicators depend on what you have promised your customers in your Service Level Agreement.
7l. Have you maintained an average uptime of 99% or higher over the past 12 months?
1 YES
You have maintained an average uptime (availability) of 99% or higher over the past 12 months. In order to obtain points in the DTAC assessment for this section, 99% uptime is the minimum threshold.
  • If you have maintained 99% or above, you receive a quarter of the maximum points
  • If you do not provide an SLA or do not report on performance, but have an uptime of 99.5% or above, you receive half of the maximum points
  • If you offer an SLA, report on performance and have an uptime of 99.9% or above, you get full points
You have not mainained an average uptime (availability) of 99% or higher over the past 12 months. In order to obtain points in the DTAC assessment for this section, 99% uptime is the minimum threshold.
  • If you have maintained 99% or above, you receive a quarter of the maximum points
  • If you do not provide an SLA or do not report on performance, but have an uptime of 99.5% or above, you receive half of the maximum points
  • If you offer an SLA, report on performance and have an uptime of 99.9% or above, you get full points
7m. Is your product Web Content Accessibility Guidelines (WCAG) 2.1 level AA compliant?
1 YES
Your product is Web Content Accessiblity Guidelines Level AA compliant, that's great!

As you may know, the DTAC requires you to make sure that people with different physical, mental health, social, cultural or learning needs can use your product, whether it's for the public or staff.

As part of your DTAC submission, you will be asked to provide an accessibility statement.

You can find a template accessibility statement here.
Your product is not Web Content Accessiblity Guidelines Level AA compliant.

The DTAC requires you to make sure that people with different physical, mental health, social, cultural or learning needs can use your product, whether it's for the public or staff.

Accessibility is about making digital services work for everyone, including people who face barriers related to:
  • Hearing, like people who are deaf or have hearing loss
  • Mobility, like people who find it difficult to use a mouse
  • Thinking or understanding in a different way, like autistic people or people with dyslexia or learning difficulties
  • Vision, like people who are blind, partially sighted or colour blind
Your team should be able to show that you:
  • Meet accessibility standards for online and offline parts, including WCAG2.2 AA and the 2018 accessibility regulations
  • Understand who the most vulnerable users for your service are and include them in user research, for example: people with access needs, people with low socio-economic status (D and E), older people, and black and minority ethnic people
  • Make sure you do not exclude any groups your service serves, for example because they lack digital skills or internet access, and you provide assisted digital support to cover any gaps
  • Avoid making any groups of people feel excluded
  • Design for low digital and health literacy;Involve users and communities at all stages, from strategy through design and implementation67
The NHS provides more guidance on WCAG 2.1 here and here.

As part of your DTAC submission, you will be asked to provide an accessibility statement.

You can find a template accessibility statement here.
7n. Are common components and patterns in use?
1 YES
The DTAC requires you to use common components and patterns in the development of your product.

You already use common components and patterns in your product, that's great!

Using common components and patterns means you do not have to solve problems that have already been solved. By using a component or pattern that’s already been extensively tested, you can provide users with a good experience in a cost effective way.

As part of your DTAC submission, your team should be able to show that you:
  • Build on common NHS styles, patterns and components
  • Share details of any new components or patterns you create or adapt (for example, by contributing to the service manual)
The NHS provides more guidance here and here.
The DTAC requires you to use common components and patterns in the development of your product.

You do not use common components and patterns in your product.

Using common components and patterns means you do not have to solve problems that have already been solved. By using a component or pattern that’s already been extensively tested, you can provide users with a good experience in a cost effective way.

Examples of these components and patterns are:
  • Content design patterns:
    Templates for structuring different types of content (e.g., forms, guides) for clarity and accessibility
  • Interaction patterns:
    Defined ways users interact with elements like buttons, menus, and search bars, creating consistent user experience
  • API (Application Programming Interface) patterns:
    Standardized ways for different systems to communicate, enabling smooth data exchange
Your team should be able to show that you:
  • Build on common NHS styles, patterns and components
  • Share details of any new components or patterns you create or adapt (for example, by contributing to the service manual)
The NHS provides more guidance here and here.
7o. Does your team contain multidisciplinary skills?
1 YES
The DTAC requires you to ensure your team contains multidisciplinary skills, as a team with diversity of expertise and perspectives is more likely to come up with the best solution. The size and roles you'll need will change as you build the service.

You already have a multidisciplinary team, that's great!

As part of your DTAC submission, you should be able to show that your team:
  • Is a multidisciplinary team that will help you achieve what you need to in each phase of development
  • Is co-located as far as possible
  • Includes people with expertise in how services are delivered across all the relevant channels, and the back end systems the service will need to integrate with
  • Has access to the specialist expertise it needs (for example clinical, legal or policy expertise, from inside or outside the organisation)
  • Will help you deal with what you believe are your riskiest assumptions
The DTAC requires you to ensure your team contains multidisciplinary skills, as a team with diversity of expertise and perspectives is more likely to come up with the best solution. The size and roles you'll need will change as you build the service.

You do not have a multidisciplinary team.

As part of your DTAC submission, you should be able to show that your team:
  • Is a multidisciplinary team that will help you achieve what you need to in each phase of development
  • Is co-located as far as possible
  • Includes people with expertise in how services are delivered across all the relevant channels, and the back end systems the service will need to integrate with
  • Has access to the specialist expertise it needs (for example clinical, legal or policy expertise, from inside or outside the organisation)
  • Will help you deal with what you believe are your riskiest assumptions
7p. Do you use agile ways of working to deliver your product?
1 YES
In order to fulfil the DTAC requirements, you should use agile ways of working.

You already use agile ways of working.

Using agile, iterative, user-centred ways of working will help you get your service in front of real users as soon as possible. Then observing and analysing data on how they use it, and iterating the service based on what you've learned.
You do not use agile ways of working in the development of your product.

In order to fulfil the DTAC requirements, you should use agile ways of working.

Using agile, iterative, user-centred ways of working will help you get your service in front of real users as soon as possible. Then observing and analysing data on how they use it, and iterating the service based on what you've learned.
  • A product owner makes a prioritised features list known as a product backlog
  • The scrum team takes one small piece of the top of the features list, called a sprint backlog, and plans to implement it
  • The team completes their sprint backlog task in a sprint (a 2-4 week period)
  • They assess progress in a meeting called a daily scrum
  • At the sprint’s end, the team closes the sprint with a review and demo, then starts a new sprint
7q. Do you continuously develop your product?
1 YES
Continuous development of your product means more than doing basic maintenance, like fixing bugs in code or deploying security patches. It means responding to feedback and changes in user needs and behaviour, clinical evidence and practice, technology and policy.

In order to fulfil the DTAC requirements, you must ensure that you iterate and improve the product throughout its lifetime. That means you should continuously collect user feedback, carry out user validation, and keep track of changes in clinical practice, technology and policy. That way, you can continuously improve your product.

You continuously develop your product, which means that you would get awarded full points.
Continuous development of your product means more than doing basic maintenance, like fixing bugs in code or deploying security patches. It means responding to feedback and changes in user needs and behaviour, clinical evidence and practice, technology and policy. You do not continuously develop your product.

In order to fulfil the DTAC requirements, you must ensure that you iterate and improve the product throughout its lifetime. That means you should continuously collect user feedback, carry out user validation, and keep track of changes in clinical practice, technology and policy. That way, you can continuously improve your product.
7r. Do you have a benefits case that includes your objectives and the benefits you will be measuring and have metrics that you are tracking?
1 YES
You have a benefits case that includes your objectives and the benefits you will be measuring or the metrics you will be tracking.

Make sure that this benefits case considers not just the cost but also use, usability and clinical benefit of your product. In this document, you should identify not only the benefits but also potential negative impact, inappropriate use or unintended consequences.

This will help you work out how your product helps improve health and well being, people's experience of health and care, and the efficiency of the health product and how you will know that you're succeeding.

The UK government provides guidance on measuring the benefits of your product, please find that guidance here.
You don't yet have a benefits case that includes your objectives and the benefits you will be measuring, or the metrics that you will be tracking. In order to fulfil the DTAC requirements, you should define what success looks like and be open about how your service is performing.

A benefits case is a document which considers not just the cost but also use, usability and clinical benefit of your product. In this document, you should identify not only the benefits but also potential negative impact, inappropriate use or unintended consequences.

This will help you work out how your product helps improve health and well being, people's experience of health and care, and the efficiency of the health product and how you will know that you're succeeding.

The UK government provides guidance on measuring the benefits of your product, please find that guidance here.
7s. Does this product meet with NHS Cloud First Strategy?
1 YES
Your product meets with the NHS Cloud First Strategy.

This is a DTAC requirement because cloud computing has a number of benefits.

The strategy highlights the potential benefits of cloud computing, including:
  • Flexibility and scalability:
    Cloud enables easy adaptation to changing demands and service growth
  • Cost-effectiveness:
    Public cloud solutions can be more cost-efficient compared to traditional on-premise infrastructure
  • Sustainability:
    Cloud can potentially offer lower environmental impact through efficient resource utilisation
  • Faster innovation:
    Cloud facilitates rapid development and deployment of new digital services
Your product does not meet the NHS Cloud First Strategy.

The NHS Cloud First Strategy means digital services should prioritise public cloud solutions unless specific reasons prevent it.

The strategy highlights the potential benefits of cloud computing, including:
  • Flexibility and scalability:
    Cloud enables easy adaptation to changing demands and service growth
  • Cost-effectiveness:
    Public cloud solutions can be more cost-efficient compared to traditional on-premise infrastructure
  • Sustainability:
    Cloud can potentially offer lower environmental impact through efficient resource utilisation
  • Faster innovation:
    Cloud facilitates rapid development and deployment of new digital services
7t. Does this product meet the NHS Internet First Policy?
1 YES
Your product meets with the NHS Internet First Policy.

This is a DTAC requirement because products being internet facing has a number of benefits.

The benefits of publishing digital services on the internet include:
  • Easier access to digital health and social care services, including remote working
  • It makes it easier for different digital services to work together
  • Increased innovation by improving accessibility to other digital service providers
  • Simpler connections for health and care organisations
  • New NHS and social care centres, such as field hospitals, can be set up more quickly
Your product does not meet the NHS Internet First Policy.

The Internet First policy states that all new health and social care digital services should be internet facing and existing services should be changed to be made available over the internet as soon as possible.

The benefits of publishing digital services on the internet include:
  • Easier access to digital health and social care services, including remote working
  • It makes it easier for different digital services to work together
  • Increased innovation by improving accessibility to other digital service providers
  • Simpler connections for health and care organisations
  • New NHS and social care centres, such as field hospitals, can be set up more quickly