Skip to main content

Help us improve the Digital Marketplace - send your feedback

Shaw Trust Accessibility Services

Living Made Easy - Part of Shaw Trust

Self Assessment tool to support Independent Living

Features

  • Online self assessments
  • remote access

Benefits

  • Multiple users
  • Professional support

Pricing

£12,000 to £150,000 a licence

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Enquiries@livingmadeeasy.org. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 3 8 6 3 7 9 2 1 6 3 2 0 6 0

Contact

Shaw Trust Accessibility Services David Asquith / Sarai Kliskey
Telephone: 03001233084 option 2
Email: Enquiries@livingmadeeasy.org

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
Database of Assistive technology
Cloud deployment model
Public cloud
Service constraints
No
System requirements
  • N/A
  • N/A

User support

Email or online ticketing support
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Support Levels: We will provide training for users and the creation of a Workbook. We then tailor this to support the client’s needs (development and testing) e.g. imagery, logos.

Cost: The standard price for this is £8,750. We charge for any on-site training with service users and employees, this costs £365 per day. We charge for additional promotional products, this depends on the product but on average this costs £200.

Support provided: Our content creator alongside the Partnership Manager will provide technical support with no additional charges.
Support available to third parties
No

Onboarding and offboarding

Getting started
Helping service users: We will help users to get started by providing them with a demonstration of the product which will then be followed up by online and on-site training.

We provide: On-site training with service users and employees will incur an additional cost of £365 per day. Where requested, we can build a demonstration licence to show what the service will look like for a service user at the beginning of the journey, this will be at no additional cost.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Mythic Software (host provider) will create data reports at the end of the contract. Our content creator will close the licence with immediate effect and a final monthly report is then sent to the user/customer once completed.
End-of-contract process
End of the contract: Customers are invited to renew their licences at certain points during their licences. When the licence ends, a final report will be provided to the customer and the service link is turned off. The final report provides information on:

• Volume of visits to the site.
• Volume of products viewed.
• Geographical coverage.
• Type of visits.

Included in the price: Within the price of the contract we include development and testing of the service including customisation. Additional costs: on-site training at a rate of £365 per day.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
The service interface is built into the licence website and can be accessed from there.
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
We are Web Content Accessibility Guidelines (WCAG) accredited. The Internal Accessibility Team from the WCAG carried out an Accessibility Services Audit in 2023, this is an annual accessibility review.
API
Yes
What users can and can't do using the API
Setting up the service: Our users can add products via the Application Programming Interface (API).

Making changes: Once the service is set up, users will have direct access to the Vendor Portal and will be able to make changes there.

Limitations: If users want to add products via the API they can do this via our hosts Mythic, but it would incur an additional cost.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
N/A

Analytics

Service usage metrics
Yes
Metrics types
Our monthly report consists of the following service metrics:

• Volume of visits to the site.
• Volume of products viewed.
• Geographical coverage.
• Type of Visits.
• Types of products viewed.
• Financial profile.
• Profile of user - general public.
• Profile of user - professional.
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
We use Azure SQL Server to store data (all within the UK).
Support for server encryption at rest is currently provided through the SQL feature called Transparent Data Encryption.
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
We provide monthly reports to users so that they can export their data. Mythic (are external to our systems and hold all of our data which we commission them to store) create a report which we extract and send to each licence holder. This is part of the users licence conditions from the start of licence.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
Secure Sockets Layer (SSL) certificates with SHA256 encryption. Minimum Transport Layer Security (TLS) 1.2 via the following Ciphers:

TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
Data protection within supplier network
Other
Other protection within supplier network
We protect data within our network through:

• Limited access to key personnel only.
• Key vault.
• Firewalls.
• Regular backups - 35 period of point in time backups for Structured Query Language (SQL) Server and tiered backups, daily weekly and monthly for the period of 3 months.
• Password management tools.
• Multifactor authentication
• Keep software up to date, updating to the latest versions of frameworks and other technology when they become available.

Availability and resilience

Guaranteed availability
Level of availability guaranteed: We use Microsoft Azure to host the services, which guarantees an SLA with regards to service up time of 99.95%.

SLAs: Our SLAs with regards to problems with the system are:

• Showstopper (SLA: 1 hour)
The whole system has an issue that renders the application completely non-functional, stopping the system from conducting any of its functionality.

• Critical (SLA: 2 hours)
The whole system or a part of the system that is deemed critical to the daily usage, will not function and there are either no work around, or a work around that is not conducive to daily use.

• Medium (SLA: 24 hours)
A part of the system that doesn’t work as intended, there may be a work around, but the rest of the system is still operational with only some impact on its use.

• Other (SLA: 48 hours)
Reserved for issues that do not affect functionality/usability such as UI rendering or an image displaying incorrectly.

We do not provide refunds as the licence is for a fixed agreed period.
Approach to resilience
This information is available upon request.
Outage reporting
Public dashboard and API: Not applicable for reporting outages.

Reporting outages: We will report any service outages via email alerts. Mythic run a report every 10 minutes and it gives us an auto alert via our content’s inbox. The partnership managers then alert all licence holders and update immediately with any changes. The back up system means we have a fall over in case of this and so we have minimal distribution.

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
Where breach of licence conditions occur, we can restrict access in management interfaces and support channels by turning access off at source, this can be done via the content team or via Mythic Software.
Access restriction testing frequency
At least every 6 months
Management access authentication
Public key authentication (including by TLS client certificate)

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
SN Registrars (Holdings) Ltd
ISO/IEC 27001 accreditation date
4/10/2022
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Information security policies/processes: Shaw Trust has a Group Information Security Policy ensuring that:

• All assets (equipment/information/information systems) for which they are responsible are used/maintained in a secure manner.
• Users do not knowingly perform any action that could interfere with the confidentiality/integrity/availability of Shaw Trust or other parties’ information or that could impair the normal operation of Shaw Trust.
• Users do not use information processing facilities for inappropriate purposes.
• Users regard all service user/other individuals’ personal information as being Confidential; it must be processed in accordance with the Trust’s Group Data Protection policy and procedures.

Reporting structure and ensuring policies are followed: All Information Security policies/procedures and reporting is the responsibility of our in-house InfoSec Team. They ensure that our policy is followed by ensuring:

• All staff undertake appropriate information security awareness training.
• The Trust’s Information Security Management System (ISMS) is reviewed/monitored/improved on an on-going basis.
• Any actual/potential security breaches and weaknesses are reported to the Security Forum.
• Appropriate corrective and/or preventive measures are recommended.
• Weaknesses in and breaches of the ISMS are analysed.
• The ISMS are supported by a schedule of internal audits.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Change requests: are processed through the JIRA ticking service. This is assessed by the development team for what needs to be done. Any security considerations are done at this stage. Approval is obtained from the various stakeholders/business leaders before implementing changes to production environments.

Tracking throughout lifetime: Our Partnership Manager has quarterly meetings with customers. We produce monthly reports to track the components of our services through the lifetime of customer’s contracts.

Assessing changes: Changes are done during scheduled maintenance windows/periods of low impact to minimise disruption of services. We use Git Version control for versioning of the underlying codebases.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Vulnerability management process: We assess and get information about potential threats through annual external penetration test of the services to identify vulnerabilities which is run against databases of various vendor announcements and security advisories of Common Vulnerabilities and Exposures (CVE’s).

Deploying patches: We will deploy any patches for vulnerabilities are quickly as possible to ensure a stable and reliable operation.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Identifying identify potential compromises: Azure has comprehensive logging across the applications we host. This includes logging of access attempts, system events, user activities, and network traffic.

Responding to compromises: The response to a potential compromise would be to triage the incident, isolate or contain the affected system, investigate the potential cause, remedy the cause and close the security gaps and restore the affected system.

Time of response to incidents: We would maintain open communications with relevant stakeholders to coordinate response efforts and manage expectations. We respond to incidents in a maximum of 24 hours (minimum 1 hour for critical incidents).
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Pre-defined processes: We have pre-defined processes for common events e.g. we send a weekly incident report (e.g. broken links report) to our manufacturers that supports our customers.

Users reporting incidents: They email out enquiries inbox which we provide them with they buy the licence, the process is also promoted on our website.

Incident reports: To provide incident reports we raise incidents to Mythic via our JIRA ticketing portal.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

AskSARA enables members of the public, their carers and family to access independent living tools to ensure they can stay in their own homes for longer. At Living Made Easy we aim to break down barriers to accessing services, so that people feel able to take the first steps in fulfilling their full potential mentally, physically, emotionally and socially.

AskSARA is an online guided advice tool for the public, part of the Disabled Living Foundation’s (DLF) Living Made Easy programme it aims to provide impartial advice about suitable assistive technology solutions that enable older and disabled people to live independently and maintain their chosen lifestyle. We passionately believe that people’s choices about where to live and what to do can often be enabled by simple aids and minor adaptations.

Pricing

Price
£12,000 to £150,000 a licence
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Included: The demo licence will show what the user can use the programme for at the beginning of the journey. This shows the sub-categories for each product type and is a whistlestop tour of the system/how to use it.

Period: The demo model will allow 1 month of access.
Link to free trial
https://livingmadeeasy.org.uk/category/access-and-mobility/access-services/access-parts-spares-and-services

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Enquiries@livingmadeeasy.org. Tell them what format you need. It will help if you say what assistive technology you use.