Title: Moving from Strategy to Delivery
1Moving from Strategy to Delivery
- Ben Hutchison
- ---
- Business Case Architect
2The Work-streams of the Single Record
3Business Case Analysis
- Consideration of
- The current position
- Investment objectives
- Benefits and risks
At 3 levels
4Moving from Strategy to Delivery
- The Business Case Process
- Strategic Outline Case (SOC)
- Outline Business Case (OBC)
- Full Business Case (FBC)
- Stakeholder engagement proposals
- Timescales
5The five case model
Strategic Outline Case (SOC)
Outline Business Case (OBC)
Full Business Case (FBC)
Strategic case
Economic case
Increasing detail
Commercial case
Financial case
Management case
6Building the Business Case
Business strategy
Options appraisal
Procurement strategy
Local Economy / Community implementation
Number of local cases to be confirmed during OBC
development
7Approval Timeline
Gateway 0 Mid November 2004
Gateway 1 2 End November 2004
Gateway 3 May 2005
8Local Implementation Timeline
Early adopter gateway 4 September 2005
9Stakeholder Engagement
- All Wales involved in
- Strategic Outline Case (today)
- Local Full Business Cases
- Working groups with representatives involved in
- Outline Business Cases
- Developing specifications
- Procuring toolkit
- If you want to be involved, mail
stakeholders_at_sip.wales.nhs.uk
10Strategic Outline Case givens (1/2)
- Coverage All of Wales (i.e. one shared solution)
- with interface management in place to deal with
cross border flows of patients and staff to and
from England - Scotland Ireland are out of scope
- Scope is all health data, accessible by everyone
who needs access to it - This includes feeds from private health and
social care - Social care and private health systems themselves
are out of scope
11Strategic Outline Case givens (2/2)
- Actual location of record
- resolved by technical architecture and maybe
distributed (i.e. some corporate and some local) - Virtual location of record
- Looks as if it is in a single place and is
orderly - Visible through single interface
- More security than just username and password a
pre-requisite - Minimum two factor authentication (e.g. security
card and password)