top of page
Frequently asked questions
What server solution should we choose - Cloud, Internal Server, or Internal Cloud?
The choice depends on your trust’s IT strategy and security requirements. Cloud solutions offer scalability and reduced on-site maintenance, while internal servers provide full control over data. Some trusts opt for internal cloud environments for a hybrid approach. Confirm with IT and IG teams to ensure compliance with NHS England guidelines.
Does the software solution comply with NHS England guidelines and trust best practices?
Compliance is non-negotiable. The solution should meet NHS England standards, trust-specific security policies, and relevant frameworks such as Data Security and Protection Toolkit (DSPT). Always request evidence of compliance during vendor evaluation.
What level of password access and authentication is required?
Access should follow the trust’s security policy, typically requiring strong passwords and Multi-Factor Authentication (MFA). If MFA is not currently in place, confirm when it will be implemented to future-proof the solution.
What type of security standards should the solution adhere to?
Look for Cyber Essentials Plus and adherence to ISO 27001 for information security management, plus encryption standards for data in transit and at rest. This ensures robust protection against cyber threats.
Is there an internal employee Wi-Fi network for smart devices to connect to?
Smart devices should ideally connect to a secure internal Wi-Fi network rather than public NHS Wi-Fi. This improves reliability and security for real-time task updates.
How will integration with other hospital systems be achieved?
The solution should support HL7 and FHIR standards for interoperability with systems like EPR and Radiology RIS. This ensures seamless data exchange and reduces manual entry errors.
What is the disaster recovery and backup strategy for the solution?
Confirm that the system includes a robust disaster recovery plan and regular data backups. This ensures continuity of service in case of hardware failure, cyber incidents, or other disruptions. Ideally, backups should be encrypted and stored in compliance with NHS data protection standards.
Has the solution undergone penetration testing and security audits?
The vendor should provide evidence of penetration testing and independent security audits. This demonstrates proactive risk management and compliance with NHS cybersecurity requirements.
If you didn’t find the answer you were looking for, our team will always be happy to help. Please contact us.
Contact Us
bottom of page
