Library Management Cloud (LMC)
Library Management Cloud (LMC) is a browser-native, fully cloud hosted and manged library management system used by public and academic libraries across the UK and Ireland. LMC serves libraries with multiple sites, mobile staff, outreach and community services and its intuitiveness promotes rapid adoption by staff and library customers alike.
Features
- Comprehensive resource management, circulation, acquisitions, stock, cataloguing, interloans
- Fully managed and maintained bibliographic records' database built-in
- Powerful library reporting and business intelligence
- Customisable online library catalogue to reflect corporate branding
- Secure internet access, device and browser agnostic
- Item discovery across all mediums and collections you serve
- Fully interoperable with other library technologies and digital services
- Routine administrative tasks undertaken on your behalf and automatically
- Multi-tenant cloud-native staff and borrower user interfaces
- Physically separate customer database servers, high availability, resilient, continuously monitored
Benefits
- Streamlines library operations for to delight your borrowers
- Quality and accurate bibliographic records to improve item discovery
- Access quality information for library decisions and operations
- Keep your online library presence topical and engaging, increase utilisation
- Confidence for users accessing the library's online services
- Increase resource discovery and use; optimise library investment
- Maximise self service capabilities, and choice for borrowers
- Free your staff to focus on customer services
- Rest assured your LMC is always up to date
- The data you control is UK resident, isolated and secure
Pricing
£12,200 a unit a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 1 7 8 7 7 0 5 3 3 7 8 0 6 3
Contact
EDUCATION SOFTWARE SOLUTIONS LTD
Rob Clark
Telephone: 01234 322100
Email: SMB-ESS-BidTeam@parentpay.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Users require devices capable of accessing the internet and web browsers.
- System requirements
- Reliable internet access
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our Support Desk operates Monday to Friday, from 08:00 to 20:00 and from 09:00 to 16:00 Saturday and Sunday, excluding English public holidays. All service requests will be responded to within one hour. Depending on the priority of each request the target to resolve it will fall within 8-working hours for P1, 24-working hours for P2, and 5-working days for P3. Purchasing offers may request a Service Level Agreement if required.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
The overall aim of Support Desk incident management is to respond and resolve an incident effectively, to the satisfaction of the Customer. The Service Level Agreement (available to buyers on request) sets out the procedures whereby our Support analysts, in cooperation with the Customer (and third party providers where applicable), will endeavour to resolve incidents that occur.
We've streamlined our support system, making it effortless to log calls via phone, email or online. We also include knowledge base and customer community forum via the Support Portal that may offer immediate advice based on known issues and knowledge articles. This user-friendly approach includes clear priorities to swiftly address urgent concerns, allowing your team to stay focused on core activities.
A customer success manager, and where appropriate an account manager, plays a crucial role as a liaison, ensuring seamless coordination with our technical and cloud experts if needed. They will also ensure that where an incident raised demonstrates a gap in customer knowledge or product training, this will be remediated in collaboration via online web meetings. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Our implementation services cover the onboarding process end-to-end including – subject to final scope - data upload, settings configuration to ensure your library operations are fully supported (eg library rules, parameters, loan types, user accounts and privileges, e-resource connections, online catalogue theme setup including branding etc).
We train your trainers, such that your own staff can cascade knowledge to the different user groups. LMC customers engage in training to use of the staff user interface for key operations such as Circulation, Acquisitions, Cataloguing etc, provided via online web meetings that you are welcome to record and share as needed with your colleagues on demand. A Customer Success Hub provides access user guides on demand too. As go-live approaches the LMC managed service analyst assigned to look after your LMC parameters and overall platform health and admin tasks day-to-day will be introduced. They will co-ordinate a reporting workshop to confirm the reports you need from our range of templates, how they are to be configured, and how they are to be scheduled for distribution to recipients and groups. The managed service analyst will also confirm with you how frequently (typically monthly) Service Reports and review meetings are to take place. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
A Standard Service Transfer Plan (SSTP) is provided, for ONE full data extraction of ALL data held within the core LMS database. The full scope of an SSTP is available upon request from G-Cloud buyers. ESS charges a fee to cover consultancy time taken to undertake the SSTP and this is given in the G-Cloud 14 Pricing document.
A Configurable Data Extraction service is available as an alternative to the SSTP. The service allows you to be selective about the data to be extracted (within the capabilities of our extraction software) and provides for multiple extraction events. The Configurable Data Extraction service is chargeable as listed in the G-Cloud 14 Pricing document. A scope document available to G-Cloud buyers upon request. - End-of-contract process
-
At the conclusion of a contract with ParentPay Group, operational access to LMC SaaS user applications via the internet will cease and the cloud hosted database environment will be disabled and decommissioned. The contract will state the timelines required for this process to be completed.
As part of decommissioning the data sanitisation process includes explicit overwriting of storage and database application servers such that data is replaced with unintelligible randomised text. Disposal at the end of the contract will render customer data entirely non-recoverable.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There are no differences in the functionality available whether a user accesses the service via a mobile or desktop computer. The solution will make best use of the screen size being used by changing how the solution is displayed in response and to ensure an optimal user experience whatever device they use.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Your library staff and customers access the service online via their web browser of choice (Edge, Opera, Safari, Chrome, Firefox etc) on any devices they wish, including PC, laptop, tablet and smartphone irrespective of platform (e.g. iOS, Android, Mac, Windows). LMC makes best use of the screen size being used to ensure an intuitive, neat and accessible experience for all.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
Compliance with the Web Content Accessibility Guidelines will mean that LMC should work with most screen readers.
Other assistive technologies include screen enlargers or magnifiers, speech or voice recognition, speech synthesisers, refreshable braille displays and braille embossers.
All customer online catalogues have an Accessibility page included with their tenant to inform their users who may wish to use assistive technologies. As a responsible supplier we also provide a Design Guide to help customers design their online catalogue theme too prior to go live, and for ongoing maintenance as they may wish to change the theme over time. - API
- Yes
- What users can and can't do using the API
- LMC makes use of RESTful APIs for integration connectors with third party systems to provide secure data exchange. These connectors are set up by our consultants during platform setup and change control procedures are applied if required thereafter.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
All LMC user profiles, for example relating to role-based capabilities, functional entitlements and information access privileges are customisable entirely to each customers' requirements. All parameters and rules underlying operations including circulation, purchasing, borrower types, item types, loan types, charges, fines, notifications, and more, required to ensure compliant lending are customisable to meet all needs of the library service and policies with with they must abide.
Customers will workshop the initial customisation of the configuration at the time of implementation to ensure the required set up from day one. Any changes will be managed through change control procedures requiring formal approval by the library service before any change is made by us on behalf of the service.
Changes to the underlying user profiles, entitlements and parameters, will be applied by an assigned and named LMC analyst as part of the LMC managed service following approval of each and every request for change.
Scaling
- Independence of resources
- ParentPay Group ensures that hosted database environments for each customer are deployed as individual instances, physically isolated from each other. The multi-tenant SaaS solutions are managed to ensure that the demand does not adversely affect any individual user's experience. And by implementing robust scalability and resource allocation strategies our infrastructure is designed to manage high loads efficiently, using advanced load balancing techniques to meet demand spikes without compromising service quality. This approach guarantees high availability and consistent performance for all users, regardless of the overall system load, ensuring that each user's interaction with our service remains stable and reliable.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Google Analytics metrics are provided to show borrower utilisation of the online library catalogue. It shows information including the device and operating system used to access the catalogue, geographical information, the pages searched and other information that digital librarians can use to inform theme design reviews etc.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- During the contract period with ParentPay Group, users with appropriate access privileges can actively run reports using the LMC reporting tool to extract information as needed.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- SLA available on request
- Approach to resilience
- Significant redundancy and resilience is built into the infrastructure and server capacity to ensure the service is always available. Enterprise monitoring solutions are deployed and the service is maintained on a 24x7 basis by a full IT team. Capacity management processed and procedures are established.
- Outage reporting
- Email based notifications are provided where appropriate.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Username or password
- Access restrictions in management interfaces and support channels
-
ParentPay Group restricts access within management interfaces and support channels by implementing robust user privilege controls. Only staff with the appropriate privileges can make changes or access specific functionalities.
The staff user interface uses two-factor authentication with username and password and IP range restriction. SysAdmin users must authenticate using a Public Key TLS Certificate with internal network access only. Online catalogue Identity federation includes Shibboleth/ Open Athens/ CAS with username and password. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Active Group Limited, trading as British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 11/04/23
- What the ISO/IEC 27001 doesn’t cover
- Providers and end users' own local computer systems and networks and their associated physical locations are outside of the ISMS scope.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
-
ParentPay operate an ISO 27001 certified Information Security Management System (ISMS) - this has been certified by a UKAS accredited certification body.
A dedicated security team of qualified specialists maintain, monitor and enforce technical and organisational security controls.
We are audited by independent specialist third parties at least four times per year.
ParentPay operate a comprehensive catalogue of security policies, processes and procedures; Including but not limited to:
Security Policy.
ISMS Manual.
Acceptable Use Policy.
Access Control and Onboarding-Offboarding.
Business Continuity Strategy.
Business Continuity Plans.
BYOD Policy.
Capacity Management Policy.
Change Control Process.
Clear Desk Policy.
Cryptography, Certificates and Key Management Policy.
Data Protection Policy.
Data Retention and Disposal Policy.
Development Process Standards and Practices.
Firewall & Router Configuration Strategy.
Incident Response Procedures.
Information Classification and Handling.
IT Decommission Process.
ParentPay Fraud and AML Strategy.
Password Policy.
Patch and Vulnerability Management Strategy.
Physical Security Policy.
Security within Project Management.
Remote Working and Mobile Device Policy.
Security Considerations for Key Decision Makers.
Social Media Policy.
Supplier and Third Party Management Policy.
System Build Standards.
IT Documented Operating Procedures.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Full change control process is applied to the product and hosting infrastructure. This applies to all assets. Changes require CAB review and approval. Security considerations are specifically identified as a strict requirment.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Internal and external components are assessed by industry leading vulnerability scanners on a weekly basis. Additional cyber risk assessment tools monitor OSINT data feeds on an ongoing basis. PCI-DSS ASV scans take place every three months. Any and all findings are subject to risk assessment and suitable remediation through change control processes. Critical and Security updates to be installed within one month of release. All other available vendor updates to be installed within 3 months of release. We actively participate in a threat sharing community and monitor special interest security groups continuously.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We operate network and host based intrusion detection systems. All infrastructure components and logging is supported by a SIEM platform, including User-Behaviour-Analytics (UBA) capabilities. Endpoint and back-office systems run DLP controls to help detect and prevent data loss events. External breach indicators are also independently monitored on an ongoing basis. Canary tokens and honeypot technology is also applied. We operate, train and regularly test a comprehensive Incident Response Programme - including forensics evidence collection capabilities. Security Incidents are responded to immediately following identification, by a dedicated security team.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our detailed Incident Response Programme has developed a full array of specific response processes for particular events. We operate, train and regularly test the full process - including forensic evidence collection processes. Security Incidents are responded to immediately following identification, by a dedicated security team. All employees are required to report any confirmed or suspected security incidents. The security team can be contacted by customers, users or employees at any time via email or telephone. Detailed incident reports are provided as necessary - including an executive summary, event timeline, investigative and containment steps, root cause analysis, remediation and lessons learned.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Environmentally friendly solution, low carbon emissions, recycled decommissioned equipment. Offers are assessed on an individual basis and dependent on client's priorities and strategic objectives.Tackling economic inequality
Offers are assessed on an individual basis and dependent on client's priorities and strategic objectives.Equal opportunity
We are an equal opportunities employer. We support our clients in promoting digital skills. Offers are assessed on an individual basis and dependent on client's priorities and strategic objectives.Wellbeing
Offers are assessed on an individual basis and dependent on client's priorities and strategic objectives.
Pricing
- Price
- £12,200 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- No