CommitteesPro
CommitteesPro is a cloud-based committee management system which has been designed from the ground up to manage the day to day activities involved in a busy democratic services team. From report writing, to Councillor profile management and the publication of agendas and plans all designed in our secure web-based environment.
Features
- Web based
- Fully hosted
- Workflow automation
- Real-time data
- Real-time reporting
- Email and SMS integration
- Third-party integration
- Multi-tenancy software architecture
- Single sign-on
- Full auditing
Benefits
- Quick to deploy and access
- Zero infrastructure required
- Seamlessly deliver updates
- Guaranteed levels of service
- Automated backups without user intervention
- Works from anywhere
- Increased security through geographically separated data centres
- Scalable through flexible subscriptions
- Lower up-front costs
- Process data on multiple devices
Pricing
£15,000 to £40,000 a unit a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 0 1 7 2 8 8 9 1 8 2 1 7 7 0
Contact
FCS SOFTWARE SOLUTIONS LIMITED
Jamie Doig
Telephone: 07764971166
Email: jamied@fcssoftware.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- An internet connection is required at all time in order to access the software.
- System requirements
-
- Ability to connect to the Internet
- Ability to access to a supported Internet Browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Business as usual email support is provided Monday to Friday between the hours of 9am to 5pm where we aim to respond within 2 working hours.
During busy periods the business will default to our standard SLA response times of Critical (1 hour), High (2 hours), Medium (4 hours), Low (8 hours). - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Business as usual: Telephone and email support is provided Monday to Friday between the hours of 9am to 5pm. We aim to respond within 2 working hours but will default to our standard SLA response times of Critical (1 hour), High (2 hours), Medium (4 hours), Low (8 hours) during busy periods.
An email support service for Critical support is available at all other times where we will make best endeavours to respond within 1 hour.
We provide General, Application and Technical Support as standard and all support levels are included within the set support and maintenance fee. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
The client is provided with access to a Training instance of the application, prior to Go Live, which can be used at any time and primarily provided to be used in conjunction with the onboarding training services.
Training is delivered remotely as standard, although onsite training can be provided at an additional cost.
Training is delivered in a train the trainer style and comprehensive training guides and user documentation is provided to support the training and delivery of the live system. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
An end of contract scenario (termination or otherwise) will trigger our Data Extraction Plan. This plan assumes a 'big bang' approach, meaning that everything happens in a one-time boxed event.
This approach acknowledges the restricted timescales that the user is typically bound by and so allows them to migrate their data to another supplier in the most practical, timely and efficient manner possible.
An overview of the process is as follows;
Step one: the suppliers appointed 'contract transition manager' will liaise with the user and agree the data extraction plan, timescales and then communicate this to all stakeholders involved in the data extraction process.
Step two: the contract transition manager will ensure that detailed supporting documentation is provided to assist the users incumbent supplier in auditing the data, in readiness for the migration, by identifying the following;
1. What the data fields are
2. What does and doesn't need to be mapped
3. Any missing data
5. Any inaccuracies
Step three: Extract the data and deposit it in a secure location (as agreed and provided by the user i.e. a secure FTP).
Step four: Provide a consultative service to assist the user during their migration process. - End-of-contract process
-
At the end of contract, in conjunction with the data extraction service, the following process will be implemented, all of which is included in the price of the contract.
1. Internally appoint one of our product delivery specialists to the role of Contract Transition Manager
2. The Contract Transition Manager will be the single point of contact for the user and any incumbent supplier, in all matters relating to the end of contract
3. The end of contract process includes the data extraction and migration assistance service (both in a physical and consultative capacity)
4. At the point of successfully extracting the data, securely delivering it to the user and receiving confirmation from the user that the data has been successfully extracted and delivered, we will commence our 'folding up' service
5. The folding up service includes the following;
a. the removal of any and all user data backups
b. Redaction and service archiving of any related information or documentation that we are legally bound to retain (for any set period of time)
c. Revoking of any and all user access to our software and services
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The system is designed to automatically scale to the screen size accessing the application.
When accessing the system using a desktop, users can use keyboard shortcuts and/or the mouse to navigate around the application and process data.
Mobile device users can use touchscreen features such as touch, swipe and zoom to navigate around the system, with access to the touchscreen keyboard allowing them to process data. - Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
-
All processes in our application use an API and the user (with the correct permissions) can call any of the same methods as the application through the API.
The user can use their own software to interact with the API or they can use a third-party to write methods that interact with the services the user uses.
All of our API documentation is documented as an Open API (Swagger) which provides a list of all of the end points. - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The entire application can be fully customised.
1. Increase and decrease the application (font size, icon size etc.)
2. Adjust the panel height and width
3. Adjust the column and row height and width
4. Group tables by applying a user defined row header
5. Filter columns so that they display customised sets of data
6. Applying a row sort in ascending and descending order
Scaling
- Independence of resources
-
Users are provided with independent databases and our services have automated scalability built-in. This prevents "other users" demand from affecting the service.
In addition, FCS continually monitor the application and API for high usage and tier up when capacity nears the pre-set threshold. The process to 'tier up' is virtually instantaneous, but to ensure that we have ample warning in advance of the service nearing a threshold, auto alerts are generated when the service hits 70% capacity.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
1. Service availability
2. Live service usage
3. Applications breakdown (documents upload, downloaded from the IER Digital Service)
4. Staffing portal (number of logins, training courses attended, pass and fail rates etc) - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
-
We use tools to safeguard data, applying symmetric encryption to encrypt and decrypt large amounts of data quickly.
Data encryption at rest provides defence-in-depth protection using the following conceptual model:
A symmetric encryption key is used to encrypt data as it is written to storage.
The same encryption key is used to decrypt that data as it is readied for use in memory.
Data may be partitioned, and different keys may be used for each partition. - Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Users can export their data using a variety of methods. The base standard is for the user to use the export option which exports all on-screen data into an Excel spreadsheet.
Alternatively the user can use the proprietary reporting tool to export specific sets of data, applying user defined reporting parameters and exporting data in a range of formats i.e. csv, tsv, Excel, PDF. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- Excel
- Doc
- CSV
- TSV
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Excel
- Word Doc
- CSV
- TSV
- Any image format
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
We provide an SLA with guaranteed levels of availability of 99.5%. The user can apply for a 10% credit or 25% credit if the guaranteed level of availability falls below 99.5% or 95% respectively.
Service credits are the sole remedy for any performance or availability issues for any service provided under the agreement.
The service credit percentage is calculated per month and based on the following formula;
Annual fee ÷ 12 (months) ÷ 100 x 10 or 25 (percentage amount dependant on the downtime)
Service Levels do not apply to any performance or availability related to:
1. Factors outside our control i.e. natural disasters, acts of terrorism
2. Use of software or services not provided by us i.e. inadequate bandwidth
3. Failure by the user to modify their use of service after being advised to modify their use of service
4. During pre-release, beta or trial versions
5. Unauthorised or lack of action when required resulting in failure to follow appropriate security practices
6. Faulty input i.e. accessing files that do not exist
Service credits claims will need to detail the incident, specify the time and duration of downtime and a describe what attempts were made to resolve the incident. - Approach to resilience
- Available on request.
- Outage reporting
-
We provide users with access to a service page that references the outage and navigates them to the email alert service. The service page is is a fall back solution that isn't hosted in any of the locations that the outed services are located.
The email alert service is triggered automatically when an outage occurs and notifies the user of the outage, detailing the following:
1. The outage (time etc.)
2. The current estimated time of resolution
3. Any mitigation steps that are being taken
While any outage would be a major country level event (given the size and use of Microsoft Azure), as with the delivery of the service page, fail safes have been added to ensure the user user notified accordingly i.e. the email alert service would continue to work as Office 365 is a global service, so would remain unaffected by a nationwide outage to the hosted service.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Username or password
- Access restrictions in management interfaces and support channels
-
As part of the installation we create an Admin account and provide the (administrative) user with access to our Users and Groups modules.
The administrator is able to use these functions to create new/edit and delete Users, create user groups i.e. Admin, Power User, Read-only User etc. and then assign permissions with different levels of access to each of these groups.
The permission and level settings within this account management module are extensive and allow the admin user to define and configure almost any combination of system access to suit any user. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Socotec
- ISO/IEC 27001 accreditation date
- 11 June 2021
- What the ISO/IEC 27001 doesn’t cover
- None.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
In line with our ISO 27001 certification, our policies are created, reviewed and maintained by the Managing Director and monitored and enforced by the Technical Director. All staff report through their line manager who in turn reports directly to the Directors.
Confidential Data Policy:
Details how we abide by the Data Protection Laws
Device Security Policy:
Details how we ensure the security of information on the workstation
File Sharing Policy:
Details how we share, transmit, view and publish sensitive, protected or confidential data or content
GDPR Policy:
Details how we process data in accordance our responsibilities under GDPR
Incidence Response Policy:
Details how we respond to breaches, Cyber security attacks and Disaster Incidents
Password Protection Policy:
Details the standard for creating passwords, its protection and frequency of change
Physical Security Policy:
Details the security controls in place to meet all legal, regulatory, contractual and standards
Security Awareness Policy:
Details our response to virus hoaxes, social engineering, malware, spyware and phishing
System Hardening Standards:
Details our standards for installations and configuring software
Wireless Policy
Details requirements that wireless infrastructure devices connect to our network
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
As part of our ISO 27001 certification, FCS have a robust change management policy and process in place.
The Change Plan covers the following;
1. Description (what will change)
2. Who will be involved in the change process
3. Links to documentation (to determine the correctness of our actions)
4. Pre-installation (everything that needs to be done before change is planned)
5. Installation plan (all actions to be performed and when)
6. Post-installation (checks to the system)
7. Backout plan (action to be performed in the event of issues)
8. Applications (collation of reference information) - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We do not have a vulnerability management process in place as this is managed by Azure.
Our Technical Director has full access to Azure's Threat Management dashboards which include:
1. Advanced Data Security
2. Vulnerabilities assessments
3. Advanced threat protection.
In regards to any other vulnerabilities, these are covered in the following policies:
1. Confidential Data Policy
2. Device Security Policy
3.File Sharing Policy:
4. GDPR Policy
5. Incidence Response Policy
6. Cyber security attacks and Disaster Incidents
7. Password Protection Policy
8. Physical Security Policy
9. Security Awareness Policy
10. System Hardening Standards
11. Wireless Policy - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Potential comprises are identified through the use of Azures Advanced Threat Protection module.
We're alerted to suspicious events, i.e. a SQL injection attack and provided with links on how to remediate it. We identify that it is a genuine threat and (if required) take steps to remediate it.
Response to these incidents are based on the threat level provided, where we will mitigate the threat, prevent future attacks and/or trigger automated responses.
High: investigate and respond immediately
Medium: investigate immediately (then respond immediately or within two calendar days)
Low: investigate within one working day and respond within five working days - Incident management type
- Supplier-defined controls
- Incident management approach
-
Our Incident Response Policy (which is applied in conjunction with our Confidentiality and Data and File Sharing policies) detail how we respond to incidents i.e. Breaches, Cyber Security Attacks, Business Continuity and Disaster Incidents.
Incidents (whether reported by the customers or discovered internally, are reported to an FCS Director who will carry out a review and categorise the incident by severity, i.e. threat of life, disruption of service.
Customers that are affected are contacted and provided with a report, which includes details of the incident, strategies to mitigate risk, and any actions that need to be taken by the customer.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Public Services Network (PSN)
Social Value
- Social Value
-
Social Value
Covid-19 recoveryCovid-19 recovery
Our cloud-based solutions support local authorities recovering from the impacts of COVID-19 by supporting new ways of working, through the delivery of solutions that are accessible on any device that has an internet connection.
This flexibility improves workplace conditions that support the COVID-19 recovery by enabling office-based working, remote-based working, or a hybrid of the two.
Pricing
- Price
- £15,000 to £40,000 a unit a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
1. Conversion of data (or the provision of test data)
2. Installation (provision of application)
3. Configuration (user access controls)
4. Support services (telephone, email, online help)
5. Full access to all elements of the application
6. Provided initially on a 3 month trial period - Link to free trial
- N/a