Skip to main content

Help us improve the Digital Marketplace - send your feedback

NEC SOFTWARE SOLUTIONS UK LIMITED

NEC Pathways Youth Offending CMS

NEC Pathways Youth Offending CMS a cloud hosted solution supporting end-to-end justice process for young people. Functionality: record creation, intelligent search, user-defined workflow, document management, appointment scheduling, case notes, diary management, dashboards, custom fields. Underneath its specialist justice capability is a core case management system, easily adapted for any sector.

Features

  • Fully integrated justice platform
  • Next generation case management system
  • Modern and simple User Interface
  • Choice of modules for youth justice
  • Highly customisable
  • In-built notification system
  • Embedded reporting and dashboards
  • Flexible Cloud Hosting
  • Two-Factor Authentication
  • Fully AssetPlus-Enabled compliant to YJB guidelines

Benefits

  • Manage different offender pathways court to sentence completion
  • Lightning-fast data entry reduces admin time
  • In-built system reminders to help manage workload
  • In-system colleague tagging to help case collaboration
  • Designed to make AssetPlus assessments more efficient
  • Customisable dashboards to see what is relevant to you
  • Important data clearly presented to ensure nothing is missed
  • Works from anywhere with two factor authentication
  • Embedded reporting means no more jumping between systems
  • No painful updates, always be on latest version of system

Pricing

£22,000 an instance a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at frameworks@necsws.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 0 6 5 1 2 6 4 4 1 3 1 7 1 9

Contact

NEC SOFTWARE SOLUTIONS UK LIMITED NEC Frameworks Team
Telephone: 07852 936231
Email: frameworks@necsws.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
NEC Pathways Youth Offending CMS can be used on PCs, Laptop or tablets and is tested for compatibility with latest versions on all common browsers but may need to be tested with very old browser versions.
Depending on sensitivity of data you can access using internet or a secure intranet; we will work with your data-owner to set up appropriate controls to protect your data.
Service Desk support is currently 09:00 to 17:30 on working days. Extended support up to 247 can be provided on request.
Maintenance is currently done at weekends. Maintenance windows can be agreed with individual customers.
System requirements
  • A PC, laptop or tablet
  • Modern Browser
  • Data owner/accreditor may decide on added security features

User support

Email or online ticketing support
Email or online ticketing
Support response times
Incidents can be raised with the Service Desk by email or telephone and will be responded to within 15 minutes during office hours. Normal office hours are 09:00 to 17:30 weekdays (except public holidays), calls or emails received outside of these hours will be responded to within 15 minutes of the start of the next working day. Extended cover up to 24/7 can be arranged if required with the same response times as working days.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Web Chat support is provided by a COTS product that has been extensively tested for assistive technology support and conforms to W3C AA Standards for Accessibility.
Onsite support
Yes, at extra cost
Support levels
Our Software-as-a-Service products comes with Service Desk, Hosting and Infrastructure Support all included in the cost. Standard Service Desk support is the same for all customers: Service Desk hours 09:00 to 17:30 weekdays (except public holidays), accessed via email, customer portal (with Web Chat support) or phone, responses within 15 minutes, severity one incidents resolved within 4 hours (see detailed SLA). The NEC Service Desk is staffed with ITIL trained, SC Cleared Analysts, fully trained on all NEC applications, able to resolve the majority of incidents on the first call. Extended Service hours up to 24/7 quoted on request at individual customer rate depending on requirement.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
The standard onboarding process is free and consists of the initial set-up of authentication and loading of reference data. NEC Pathways Youth Offending CMS comes with a self-service kiosk for password maintenance with administrator facilities for on-going security management. We can set up the administrators who can then manage the rest of the staff or we can perform an initial loading by importing a CSV file. Each customer will have an account manager who takes care of the onboarding process, ensuring the correct set-up of authentication and reference data. NEC Pathways Youth Offending CMS has an individual instance of the training system for each customer and comes with a free train-the-trainer session.
Additional on-boarding including cascade training, development of bespoke modules or APIs or individual infrastructure will be quoted on an individual basis.
The standard offering is a multi-tenanted offering utilised by multiple customers with individual authentication paths to segregate their data. Customers with particularly sensitive data may request an individual bespoke hosting environment (in the cloud hosting environment of their choice) with addition security and defence architecture. MOJ customers already have an accredited multi-tenanted infrastructure in AWS so additional on-boarding infrastructure is quick and cost-effective.
Service documentation
Yes
Documentation formats
  • ODF
  • PDF
End-of-contract data extraction
At the end of the contract customers will be provided with their production data using a CESG certified procedure. The data is extracted from the production system and can be provided in a number of formats including SQL Server, CSV and Excel. If the data is sensitive, we will protect it on a CESG approved encrypted drive that will be securely transported to the customer using a process approved by the customer data owner. Once the data has been extracted the cloud data storage will be erased using CESG approved techniques.
End-of-contract process
NEC Pathways Youth Offending CMS is a cloud hosted Software-as-a-Service Product and is charged on a usage basis plus a basic monthly subscription. At the start of the contract each customer is provided with a URL to access NEC Pathways Youth Offending CMS and their users are set up with valid authentication to access the system. At the end of the contract, after the customer data has been returned, access will be removed and the customer’s databases (including the authentication) will be erased using CESG approved techniques. There is no additional cost to provision of the data extract or termination.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
NEC Pathways Youth Offending CMS is accessed via browsers on desktop PCs, laptops, tablets, displays detects and adjusts to the display / device in use. NEC Pathways Youth Offending CMS can be used on a smartphone with appropriate security provision if data is sensitive, but the application is optimised for use on desktop PCs, laptops and tablets.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
NEC's applications are built to use modern, lightweight REST/JSON web service interfaces; to best enable open and extensible architectures that can integrate between systems, data mining and application extensions.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
NEC's applications are built to use modern, lightweight REST/JSON web service interfaces; to best enable open and extensible architectures that can integrate between systems, data mining and application extensions.
API
Yes
What users can and can't do using the API
NEC Pathways Youth Offending CMS is designed using a micro-services architecture where discrete functions or services communicate through APIs which facilitates interfacing. CM can integrate with other applications or OGNs (Other Government Networks) to receive standard reference data ensuring consistency. NEC Pathways Youth Offending CMS can interface with third party applications to provide data to and receive data from enterprise resource management or with other Case Management or HR Systems. NEC Pathways Youth Offending CMS APIs are easy to configure and are set up in on-boarding.
API documentation
Yes
API documentation formats
Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Because NEC Pathways Youth Offending CMS has been developed using a micro-services architecture it is easy to customise. The NEC Pathways Youth Offending CMS Roadmap is reviewed at bi-annual User Group Meetings and the user community agrees on priorities. Representatives from the User Group also participate in Agile development of the releases ensuring that each enhancement benefits from practitioner input. Product releases are included in the SaaS license subscription, but individual customers can also request bespoke development. These enhancements are developed with the customer using the agile methodology.

Scaling

Independence of resources
Performance on all customer systems is monitored with real-time dashboard displaying utilisation of processor, memory and disk. Automatic alerting provides timely warning or the need to augment resource and new virtualised resource can be implemented before any impact occurs. Network analysis tools display all internal traffic within applications so any constraints building on any system node are anticipated and managed. Customers with particularly sensitive data may opt to operate on dedicated virtual cloud infrastructure for security reasons; regardless of whether running on dedicated or shared infrastructure resources are maintained well above thresholds and monitored to ensure better that SLA performance.

Analytics

Service usage metrics
Yes
Metrics types
NEC Pathways Youth Offending CMS provides detailed usage metrics. The Software-as-a-Service charge is calculated on a combination of a fixed fee per business unit and a variable fee based on usage and customers are provided with the number of user logged-on each day, the number of unique users logged-on (as opposed to someone who takes a break and comes back into the system), number of clients / offenders, the number of open interventions and a history of he completed interventions. Service Desk statistics on incident management and SLA performance are also available to users and to the User Group.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Other
Other data at rest protection approach
Data at rest is protected according to the solution selected by the customer and the cloud provider capabilities. All cloud providers support as a minimum AES-256 encryption of data. NEC encourage its customers to protect their own data using encryption technologies where they are the sole decryption key owners. In this way, our customers are assured that their data can never be accessed by a third party. NEC own data is encrypted when the service requires it.
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
NEC Pathways Youth Offending CMS is designed to provide easy access to data within and outside the application. The micro-services architecture facilitates interfacing through APIs including a standardised CMS interface which passes all attendance and progress data back to the CMS and the potential for customised interfaces with other customer applications. Standard reporting provides comprehensive dashboards and KPI monitoring, and users are able to build their own reports and data extracts. Search screens are customisable and the data from any search can be exported to Excel.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks
Alongside deep inspection of protocols (WAF), NEC controls the logical networks that are created atop the physical cloud provider infrastructure. We use defence in depth approach, logically segment networks where possible, configure several firewall layers, IPSs, deep packet inspection and real time security event correlation monitoring.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection within supplier network
As well as using Private network or public sector networks, Web Application Firewalls and Segmentation, NEC controls the logical networks that are created atop the physical cloud provider infrastructure. We use defence in depth approach, we logically segment networks where possible, configure several firewall layers, IPSs, deep packet inspection and real time security event correlation monitoring.

Availability and resilience

Guaranteed availability
NEC guarantees high levels of availability by hand picking cloud providers which promise outstanding uptimes and high levels of accountability in their work. The minimum uptime requirement that we consider acceptable is 99.9%. We strive to ensure that if in the unlikely chance that any downtime does occur, that the root cause of the problem is identified to prevent any future occurrences.
Approach to resilience
Our service relies on the cloud providers capabilities, which are deployed across a number of availability zones (local replication), sites (Data Center replication) and regions (geo replication) offering various levels of resilience. Each availability zone is designed to eliminate single points of failure (such as power, network and hardware). By default, a standard service would allocate a container to the Kubernetes cluster in a single availability zone. In addition, all customer applications are deployed across multiple availability zones, to ensure service continuity can still operate should a failure occur.
Outage reporting
Outages are identified as Planned maintenance, Emergency maintenance, and platform issues. Service outage portals provide end user live feedback on outages allowing the user to know in real time without having to call the NEC support desk to ask one of our expert engineers to launch an investigation into the root cause. Emails are also sent out for Planned maintenance, Emergency maintenance, and platform issues. The designated Technical Account Manager will proactively contact customers as appropriate.

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
Access restrictions in management interfaces and support channels
NEC Pathways Youth Offending CMS is supported by the NEC Service Desk supported by second-line Live Services support and applications support. Access to the live environment is strictly controlled to SC cleared staff on the principle of least privilege. Access is issued by security management to specific individuals for specific tasks for specific periods and controlled through rigorous authentication policies. A full audit trail of all interventions is maintained for forensic purposes.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
07/06/2021; valid until June 2024. Certificate IS 598449.
What the ISO/IEC 27001 doesn’t cover
N/A our ISO 27001 certification covers all our office location.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • Cyber Essentials and Cyber Essentials Plus
  • Business Continuity Management ISO22301:2019
  • Environmental Management ISO14001:2015
  • Information Security Management ISO27001:2013
  • Service Management ISO20000:2018
  • Quality Management ISO9001:2015

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
NEC has a number of inter-connected governance frameworks in place which control how the company operates and provides its services to customers. The most relevant of these is certification to ISO/IEC27001:2013, the international standard for Information Security Management Systems. Various policies refer to: SPG016P-Acceptable use of NEC resources & assets; SIM009P – User account security instructions and password management; SIM033P-User access control instructions; SPG017P-Physical security procedures; SPG018P-Data handling procedures; SPG019P-Data access procedures; SPG020P Network access procedures; SPG022P-Change management; SPG026P-Incident management; SPG027D- Business and service continuity; SPG032P-Backup procedures; SIM011P – NEC Network Administrator SyOps; SIM039N – NEC Infrastructure Group Policies; SIM020N – Log Monitoring Guide; SPG023P Internal IS Audit Procedures; SPG029P Document Management Procedure; SPG030P Compliance Checking Procedures; SPG036P Software Patching Procedures; SPG037P Hardware Lifecycle Management; SPG038P Software Lifecycle Management; SPG042P Software Development - Testing; SPG045P Agile Software Development Policy; SPG046P Secure Services Engineering; SIM003P Illegal Working checklist; SIM034P Staff Recruitment Checklist; SIM041P Infrastructure Outage Instructions; SIM043P Acceptance into Service Checklist. There are several other Technical server builds, client builds, vulnerability management, firewall controls baselined documents. All policies are covered by NEC review procedure. Policies for critical assets are reviewed six monthly and other are reviewed at least annually.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
NEC is certified for ISO20000:2018 for Service Management, which covers both our Configuration Management and Change Management processes. This is audited both internally by our Data Protection Officer (DPO) and Head of the Compliance, Risk and Audit team, and externally by the UKAS accredited audit body British Standards Institute, (BSI). NEC follows an ITIL-based approach, and the NEC service desk personnel have undergone the relevant ITIL qualifications for their roles. Our CMDB is updated accordingly throughout the lifetime of the asset, up to and including decommissioning and disposal.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
NEC has entered into security knowledge sharing partnerships to react to new and increasing threat levels. NEC are members of the NCSC Cyber Security Information Sharing Partnership (CiSP) for early identification and advice on security threats, incidents and solutions. The NEC InfoSec team subscribes to a number of key suppliers and cyber security websites, which send daily alerts on the latest vulnerabilities. NEC are members of the Cyber Network Reporting Service (CNR) that helps the NCSC to rapidly notify organisations that might be affected by malicious software.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
NEC implements a Security Information and Event Management (SIEM) system which provides alerts and reports that enable log sources to be processed in accordance with GPG13. Custom rules can be defined to detect and alert on suspicious behaviour. The InfoSec team reviews the SIEM alerts and reports on a daily basis to check for any anomalous behaviour. The NEC security monitoring policies and practices are aligned with incident management policies and practices. Any significant security issues identified will result in the NEC InfoSec team raising a security incident in the NEC service management system to initiate the detailed analysis process.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident Management is part of our ISO27001:2022 certified Information Security Management system (ISMS). All incidents are handled within the same process. Users report incidents through the Service Desk, and a Security Incident is then raised on the ISMS. This is reviewed by the Security Team and is managed in accordance with the Security Incident Management Process. The security incident is kept updated, and once the Security Incident is closed a full report is produced which is used to identify any lessons learnt.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
Public Services Network (PSN)

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

NEC is committed to being Net Zero by 2030.
To support this objective, we targeted a 50% reduction in our 2020 baseline emissions by 2026. We are ahead of target, having already achieved an independently audited reduction of 64% in tonnes of carbon dioxide equivalent(tC02e).
We have implemented a multitude of initiatives to support this, including:
-Appointing an Environmental Manager and Environmental Champions to promote our objectives.
-Successfully obtaining certification for and implementing ISO14001:2015 Environmental Management System(EMS).
-Developing a Carbon Reduction Plan, which is published on our website.
-Maintaining an Environmental Aspect and Impact Register (down to site level) through which to capture the elements of our operating practices that could negatively impact the environment.
-Working with government accredited consultants to understand our environmental impact.
-Collaborative activities to influence customers, supply chain partners and employees.
Specific initiatives applicable to our contract delivery approach include:
-Ensuring directly sourced energy is from renewable sources.
Reducing business travel where possible through utilisation of controls and technology such as:
-Video conferencing.
-Electronic sharing of documents.
-Conference call facilities.
-Working from home/flexible working arrangements.
-Approval controls for commercial flights.
-Use of environmentally friendly data centres.
Additionally, our Environmental Policy objectives include:
-Meeting all relevant legal requirements and monitoring our compliance.
-Minimising our environmental impacts for the life cycle (including disposal) of work equipment and other physical assets under our control.
-Demonstrating efficient use of energy, water, and other natural resources
-Maximising opportunities to minimise our waste by reusing or recycling waste, where practical.
-Ensuring our supply chain are aware of our environmental policy and our commitment to ensuring its effective implementation.
Increasing environmental awareness and commitment amongst employees through training and briefings.
We’ll continue to identify opportunities to improve our environmental performance through clear objectives, plans and targets.

Covid-19 recovery

During the COVID-19 global health crisis, NEC supported its workforce, customers and the local communities they serve, to adapt to the challenges the pandemic posed. As a provider of software and services to the public sector, this included the rapid development and deployment of software solutions to enable the efficient and effective delivery of new government schemes and changes in legislation introduced as a direct response to the pandemic. Examples include provision of software to assist with Test and Trace Support Payments and new hospitality sector licensing requirements.
Initiatives we implemented that support the policy outcomes include:
• Increasing our pre-pandemic workforce numbers through recruitment of an additional 250 UK based roles, many of whom were unemployed following redundancy from other sectors such as hospitality.
• Re-training and redeploying temporarily displaced colleagues rather than imposing redundancies or taking advantage of the furlough scheme.
• Investing over £400,000 in training and apprenticeships.
• Working collaboratively with customers to introduce new ways of working.
• Delivering community based social value through donations in kind to voluntary sector organisations impacted by the pandemic.
As part of our response to the pandemic we invested in and introduced several initiatives and workplace adaptations to protect employee health and safety, including:
• Introducing wider use of remote and flexible working, including making additional allowances for those caring for young children.
• Enhancing office safety, including installing sanitising stations, hygiene screens and digital thermometers.
• Increasing the frequency of colleague communications, with a focus on provision of mental health support and reducing the risks of isolation/loneliness.
• Providing all employees with free access to additional specialist resources, including 24x7 counselling and mental health services.

Tackling economic inequality

We recognise the expertise, innovation and value that can be gained from having a diverse supply chain and providing all suppliers with a fair and equal opportunity to become suppliers to us and our customers. We operate openly and transparently to enable this collaborating with third-party suppliers including large enterprises, sub-contractors, SMEs, VCSEs, mutuals and social enterprise organisations.
Additionally, we are committed to nurturing talent and creating a sustainable learning and development culture that equips our workforce with the appropriate skills, knowledge and processes so that the company continues to deliver innovative, industry leading solutions.
Processes and practices we have adopted to tackle economic inequality include:
• Using outcome-based specifications and co-design methods to encourage suppliers, communities, users and third sector organisations to collaborate and propose solutions based upon end user requirements, rather than being prescriptive.
• Advertising supply chain opportunities openly and always operating transparently.
• Including modules covering anti-bribery and corruption, whistleblowing, equality and diversity in our all-colleague compulsory Annual Compliance Training.
• Having policies and operating practices that support effective supply chain relationships through fair selection and responsible management. For example, only flowing down appropriate contract terms.
• Paying at least 95% of all invoices within agreed terms and agreeing to reduced payment terms for SMEs and subcontractors.
• Never deducting sums from payments as a charge for remaining on our supplier list.
• Investing in new jobs and training opportunities through an active Apprenticeship scheme. We recruited 18 apprentices in 2023.
• Creating opportunities for career progression and investing in reward and recognition initiatives that support employee retention.
• Following the foundational principles of the Good Work Plan in respect of employee satisfaction, fair pay, well-being and safety, career progression, voice, and autonomy.
• Having appropriate controls in place to mitigate cyber security risks.

Equal opportunity

We want to be an employer of choice for people of all backgrounds and we are committed to ensuring workers either directly employed or employed within our supply chains are treated fairly, humanely, and equitably. We will not discriminate on grounds of gender, marital status, race, ethnic origin, colour, nationality, national origin, disability, sexual orientation, religion, age or any other characteristic.
To encourage a diverse and varied workforce our approach to equal opportunity includes:
-Inclusive and accessible recruitment practices, including supporting candidates and employees with disabilities through provision of supportive technology and/or changes to working practices.
-Collecting, analysing and senior reporting of equality and diversity data obtained during recruitment activities.
-Making appointments on the grounds of selecting the most suitable candidate for the post.
-Ensuring job adverts reach a diverse audience, including utilising job sites which encourage interest from disadvantaged and Minority Ethnic groups.
-Having diverse interview panels and anonymising applications.
-Using gender-neutral role definitions.
-Ensuring policies and employee communications promote respect and equality for all.
Other activities to support equal opportunity within the workforce include:
-Tackling the gender pay gap, through annual audits. Women now comprise 50% of our leadership team, including our Chief Executive.
-Compliance with the Modern Slavery Act 2015 and the nine core principles of the Ethical Trading Initiative Base Code.
-Ensuring effective supply chain controls are in place to mitigate and manage the risks of exploitation.
-Provision of appropriate channels for colleagues to have an effective voice, such as our Employee Steering Group.
-Investment in workforce development and training, including an active Apprenticeship programme.
-No use of zero hours contracts or fire and rehire practices.
-Being a Real Living Wage Employer.
-Flexible working practices.
-Transparent and structured promotion, pay and reward processes.
-Senior level sponsorship at board level to support and promote equal opportunity.

Wellbeing

Our approach to supporting good health and wellbeing includes providing our workforce with:
• Access to helpful health and wellbeing resources through our dedicated intranet Wellness Hub.
• A LinkedIn Learning Platform that includes a section dedicated to health and wellbeing, including advice for managers on opening up dialogue about mental health and emotional safety.
• Free and confidential access to specialist resources 24x7, including counselling and mental health services through our Employee Assistance Programme.
• Private healthcare cover including a Doctor at Hand service for fast and convenient access to advice, assistance and medical treatment, anytime and anywhere.
• Maintaining compliance with the six standards of the Mental Health at Work commitment.
• Accommodating workplace adjustments, such as supportive technology for those with a disability or health condition.
• Encouraging good physical health by providing discounted corporate gym membership at over 3,300 participating gyms through our employee GymFlex scheme.
• Access to a cycle to work scheme through salary sacrifice.
Employee Communications
We incorporate national health and wellbeing campaigns within our yearly communications calendar to raise employee awareness and signpost to useful support pathways. Our 2024 calendar will include the following nationally recognised campaigns:
• Mental Health Awareness week.
• World Menopause Day.
• National Eye Health week.
• World Diabetes Day.
• Stress Awareness Month.
• Suicide Prevention Day.
• Men's Health week.
We have Mental Health First Aiders who are trained to spot the signs of mental ill health and can provide early support for colleagues who may be developing a mental health issue.
Policies
Support for employee health and wellbeing is underpinned by a policy framework including:
• Health and Safety Policy
• Alcohol, Drugs & Solvent Abuse Policy
• Menopause Policy
• Absence Policy
• Flexible Working Policy
• Gender Reassignment Policy.

Pricing

Price
£22,000 an instance a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at frameworks@necsws.com. Tell them what format you need. It will help if you say what assistive technology you use.