Shaw Trust Accessibility Services
Living Made Easy - Part of Shaw Trust
Self Assessment tool to support Independent Living
Features
- Online self assessments
- remote access
Benefits
- Multiple users
- Professional support
Pricing
£12,000 to £150,000 a licence
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at Enquiries@livingmadeeasy.org.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
1 3 8 6 3 7 9 2 1 6 3 2 0 6 0
Contact
Shaw Trust Accessibility Services
David Asquith / Sarai Kliskey
Telephone: 03001233084 option 2
Email: Enquiries@livingmadeeasy.org
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Database of Assistive technology
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
-
- N/A
- N/A
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Support Levels: We will provide training for users and the creation of a Workbook. We then tailor this to support the client’s needs (development and testing) e.g. imagery, logos.
Cost: The standard price for this is £8,750. We charge for any on-site training with service users and employees, this costs £365 per day. We charge for additional promotional products, this depends on the product but on average this costs £200.
Support provided: Our content creator alongside the Partnership Manager will provide technical support with no additional charges. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Helping service users: We will help users to get started by providing them with a demonstration of the product which will then be followed up by online and on-site training.
We provide: On-site training with service users and employees will incur an additional cost of £365 per day. Where requested, we can build a demonstration licence to show what the service will look like for a service user at the beginning of the journey, this will be at no additional cost. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Mythic Software (host provider) will create data reports at the end of the contract. Our content creator will close the licence with immediate effect and a final monthly report is then sent to the user/customer once completed.
- End-of-contract process
-
End of the contract: Customers are invited to renew their licences at certain points during their licences. When the licence ends, a final report will be provided to the customer and the service link is turned off. The final report provides information on:
• Volume of visits to the site.
• Volume of products viewed.
• Geographical coverage.
• Type of visits.
Included in the price: Within the price of the contract we include development and testing of the service including customisation. Additional costs: on-site training at a rate of £365 per day.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- The service interface is built into the licence website and can be accessed from there.
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- We are Web Content Accessibility Guidelines (WCAG) accredited. The Internal Accessibility Team from the WCAG carried out an Accessibility Services Audit in 2023, this is an annual accessibility review.
- API
- Yes
- What users can and can't do using the API
-
Setting up the service: Our users can add products via the Application Programming Interface (API).
Making changes: Once the service is set up, users will have direct access to the Vendor Portal and will be able to make changes there.
Limitations: If users want to add products via the API they can do this via our hosts Mythic, but it would incur an additional cost. - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- N/A
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Our monthly report consists of the following service metrics:
• Volume of visits to the site.
• Volume of products viewed.
• Geographical coverage.
• Type of Visits.
• Types of products viewed.
• Financial profile.
• Profile of user - general public.
• Profile of user - professional. - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
-
We use Azure SQL Server to store data (all within the UK).
Support for server encryption at rest is currently provided through the SQL feature called Transparent Data Encryption. - Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- We provide monthly reports to users so that they can export their data. Mythic (are external to our systems and hold all of our data which we commission them to store) create a report which we extract and send to each licence holder. This is part of the users licence conditions from the start of licence.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
-
Secure Sockets Layer (SSL) certificates with SHA256 encryption. Minimum Transport Layer Security (TLS) 1.2 via the following Ciphers:
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_256_GCM_SHA384
TLS_RSA_WITH_AES_128_GCM_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA256
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA - Data protection within supplier network
- Other
- Other protection within supplier network
-
We protect data within our network through:
• Limited access to key personnel only.
• Key vault.
• Firewalls.
• Regular backups - 35 period of point in time backups for Structured Query Language (SQL) Server and tiered backups, daily weekly and monthly for the period of 3 months.
• Password management tools.
• Multifactor authentication
• Keep software up to date, updating to the latest versions of frameworks and other technology when they become available.
Availability and resilience
- Guaranteed availability
-
Level of availability guaranteed: We use Microsoft Azure to host the services, which guarantees an SLA with regards to service up time of 99.95%.
SLAs: Our SLAs with regards to problems with the system are:
• Showstopper (SLA: 1 hour)
The whole system has an issue that renders the application completely non-functional, stopping the system from conducting any of its functionality.
• Critical (SLA: 2 hours)
The whole system or a part of the system that is deemed critical to the daily usage, will not function and there are either no work around, or a work around that is not conducive to daily use.
• Medium (SLA: 24 hours)
A part of the system that doesn’t work as intended, there may be a work around, but the rest of the system is still operational with only some impact on its use.
• Other (SLA: 48 hours)
Reserved for issues that do not affect functionality/usability such as UI rendering or an image displaying incorrectly.
We do not provide refunds as the licence is for a fixed agreed period. - Approach to resilience
- This information is available upon request.
- Outage reporting
-
Public dashboard and API: Not applicable for reporting outages.
Reporting outages: We will report any service outages via email alerts. Mythic run a report every 10 minutes and it gives us an auto alert via our content’s inbox. The partnership managers then alert all licence holders and update immediately with any changes. The back up system means we have a fall over in case of this and so we have minimal distribution.
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- Where breach of licence conditions occur, we can restrict access in management interfaces and support channels by turning access off at source, this can be done via the content team or via Mythic Software.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Public key authentication (including by TLS client certificate)
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- SN Registrars (Holdings) Ltd
- ISO/IEC 27001 accreditation date
- 4/10/2022
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Information security policies/processes: Shaw Trust has a Group Information Security Policy ensuring that:
• All assets (equipment/information/information systems) for which they are responsible are used/maintained in a secure manner.
• Users do not knowingly perform any action that could interfere with the confidentiality/integrity/availability of Shaw Trust or other parties’ information or that could impair the normal operation of Shaw Trust.
• Users do not use information processing facilities for inappropriate purposes.
• Users regard all service user/other individuals’ personal information as being Confidential; it must be processed in accordance with the Trust’s Group Data Protection policy and procedures.
Reporting structure and ensuring policies are followed: All Information Security policies/procedures and reporting is the responsibility of our in-house InfoSec Team. They ensure that our policy is followed by ensuring:
• All staff undertake appropriate information security awareness training.
• The Trust’s Information Security Management System (ISMS) is reviewed/monitored/improved on an on-going basis.
• Any actual/potential security breaches and weaknesses are reported to the Security Forum.
• Appropriate corrective and/or preventive measures are recommended.
• Weaknesses in and breaches of the ISMS are analysed.
• The ISMS are supported by a schedule of internal audits.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Change requests: are processed through the JIRA ticking service. This is assessed by the development team for what needs to be done. Any security considerations are done at this stage. Approval is obtained from the various stakeholders/business leaders before implementing changes to production environments.
Tracking throughout lifetime: Our Partnership Manager has quarterly meetings with customers. We produce monthly reports to track the components of our services through the lifetime of customer’s contracts.
Assessing changes: Changes are done during scheduled maintenance windows/periods of low impact to minimise disruption of services. We use Git Version control for versioning of the underlying codebases. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Vulnerability management process: We assess and get information about potential threats through annual external penetration test of the services to identify vulnerabilities which is run against databases of various vendor announcements and security advisories of Common Vulnerabilities and Exposures (CVE’s).
Deploying patches: We will deploy any patches for vulnerabilities are quickly as possible to ensure a stable and reliable operation. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Identifying identify potential compromises: Azure has comprehensive logging across the applications we host. This includes logging of access attempts, system events, user activities, and network traffic.
Responding to compromises: The response to a potential compromise would be to triage the incident, isolate or contain the affected system, investigate the potential cause, remedy the cause and close the security gaps and restore the affected system.
Time of response to incidents: We would maintain open communications with relevant stakeholders to coordinate response efforts and manage expectations. We respond to incidents in a maximum of 24 hours (minimum 1 hour for critical incidents). - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Pre-defined processes: We have pre-defined processes for common events e.g. we send a weekly incident report (e.g. broken links report) to our manufacturers that supports our customers.
Users reporting incidents: They email out enquiries inbox which we provide them with they buy the licence, the process is also promoted on our website.
Incident reports: To provide incident reports we raise incidents to Mythic via our JIRA ticketing portal.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
AskSARA enables members of the public, their carers and family to access independent living tools to ensure they can stay in their own homes for longer. At Living Made Easy we aim to break down barriers to accessing services, so that people feel able to take the first steps in fulfilling their full potential mentally, physically, emotionally and socially.
AskSARA is an online guided advice tool for the public, part of the Disabled Living Foundation’s (DLF) Living Made Easy programme it aims to provide impartial advice about suitable assistive technology solutions that enable older and disabled people to live independently and maintain their chosen lifestyle. We passionately believe that people’s choices about where to live and what to do can often be enabled by simple aids and minor adaptations.
Pricing
- Price
- £12,000 to £150,000 a licence
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
Included: The demo licence will show what the user can use the programme for at the beginning of the journey. This shows the sub-categories for each product type and is a whistlestop tour of the system/how to use it.
Period: The demo model will allow 1 month of access. - Link to free trial
- https://livingmadeeasy.org.uk/category/access-and-mobility/access-services/access-parts-spares-and-services
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at Enquiries@livingmadeeasy.org.
Tell them what format you need. It will help if you say what assistive technology you use.