Skip to main content

Help us improve the Digital Marketplace - send your feedback

TIMEEDIT UK LIMITED

Higher Education Workload Management Software

TimeEdit delivers a user-focused Workload Management solution, offering comprehensive management capabilities (including creation, budgeting, scenario planning and vacancy overviews) through a SaaS model.

This solution empowers clients with improved transparency, streamlined operations, resource efficiency, and provides enhanced financial visibility over their academic workload planning, management and delivery.

Features

  • Dynamic system accessibility from any browser on any device
  • High system stability ensures reliable, uninterrupted service
  • Real-time reporting or export data to use with in-house tools
  • API available for up and downstream integrations
  • Natively integrated with other TimeEdit modules
  • Detailed audit functionality: time, date and user information
  • In-built SSO integration
  • Adaptable and robust platform with integrated tools
  • Live, current data ensures users see accurate system information

Benefits

  • Web-based workload management tool
  • Infinitely customisable workload management workflows tailored to your requirements
  • Workflow status updates ensure users stay informed on processes
  • Efficient workload management, building on last year's data
  • Dynamic Staff Student Ratio calculations
  • Real-time flexible reporting to empower users
  • Subject, School, Department, and Faculty staffing resource overviews
  • Scenario planning and costings
  • Financial oversight of programme, course and module resource delivery costs

Pricing

£30 to £50 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at matt.dalton@timeedit.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 4 3 6 7 6 1 2 4 2 8 5 4 9 5

Contact

TIMEEDIT UK LIMITED Matt Dalton
Telephone: 07742183278
Email: matt.dalton@timeedit.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
TimeEdit offers unrestricted service, ensuring 99.95% reliability. Any planned maintenance is carefully planned for non-business hours and is brief, typically lasting just a few minutes, to ensure minimal disruption to the user experience. Fully compatible with all major web browsers, TimeEdit eliminates the need for specific hardware. The system will be available 24 hours a day, 7 days a week, excluding planned maintenance, guaranteeing continuous accessibility for our clients.
System requirements
Web browser (Safari, Chrome, Firefox & Edge)

User support

Email or online ticketing support
Email or online ticketing
Support response times
TimeEdit's email and ticketing support system accepts submissions 24/7, year-round. Live support for tickets operates from 9am to 5pm on weekdays, barring holidays. During these hours, our team aims to respond initially within 1.21 hours.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Our standard support package, included with every license, guarantees access to our engineers and support team during your business hours (9am to 5pm, weekdays).
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Training on using TimeEdit is always included for different user groups in our setup. This training is available both online and in person, with a mix of the two often yielding the most effective implementation. The exact blend is tailored to the clients individual needs. Both new and established users gain access to our comprehensive knowledge base, which includes user manuals, support queries, and training materials for all our software. If users require information beyond what's available, our dedicated support team is just a phone call away. Additional training sessions can be arranged anytime with our Customer Success Team.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
DOCX
End-of-contract data extraction
Users have the ability to export all data input into the TimeEdit system via a file export. Clients can perform this export independently or may seek assistance from our support team.
End-of-contract process
Upon contract termination, we will transfer all data to the client upon request and conduct a thorough deletion of the client's content, ensuring no possibility of restoration. We do not retain any backup files, as stipulated in the contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
TimeEdit supports and is compliant with standardised web and enterprise technologies, rendering a completely device-agnostic experience. Leveraging cross-browser and platform compliant HTML5 standards, TimeEdit provides compatibility with all major browsers (Edge, Firefox, Safari, Chrome), as well as both desktop and laptop computers, tablets, and mobile phones.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
TimeEdit's interface, innovatively designed for ease and user engagement, enables users to quickly become proficient shortly after completing their training. With a focus on intuitive design, it integrates visual and interactive elements for straightforward navigation, further supported by instructional videos to ensure a smooth user experience. Delivered as SaaS, our applications are entirely web/HTML5-based, ensuring compatibility across desktops, laptops, mobile phones, and tablets.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
TimeEdit provides multiple API interfaces depending on the individual use-case and customer preference. At the basic level, TimeEdit provides both a SOAP and REST API that - depending on authentication - provides access to both public and private data. These interfaces can either be accessed as is (via standard HTTP(S) calls), or through one of TimeEdit’s integration interfaces. The APIs accept xml as input and output formats, and - for certain calls - multipart form data in the form of e.g., CSV or xlsx.
All APIs enable full read / write access to the the server and database, depending on the privileges and permissions specified by the authentication. Generally speaking, the APIs allow the user full programmatic access to all of TimeEdit’s functionality.
TimeEdit provides comprehensive API documentation, accessible via https://timeedit.readme.io/, which provides complete coverage of all our APIs and integration interfaces. This online resource includes detailed explanations, as well as practical examples, to assist users in understanding and utilising the platform's API capabilities effectively. All APIs are owned and maintained by TimeEdit and TimeEdit follows standard release protocols and API versioning so as to avoid introducing breaking changes that would adversely impact existing integrations.
API documentation
Yes
API documentation formats
Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
TimeEdits product suite can be customised to a granular level. Some examples are, the interface can reflect your branding, including logos, text and colour palette. In-system user-defined fields can be structured following your data module, configure to your naming conventions, determine whether fields are mandatory or optional, and control field visibility based on the user's role profile.

Scaling

Independence of resources
TimeEdit can guarantee no slowdown or restrictions by having multiple users accessing the service at the same time. This is achieved through automatic scaling of server capacity, logical route backups, and failover management such as established redundancy and abstraction. This has led to our average up-time of 99.99%.

Analytics

Service usage metrics
Yes
Metrics types
Our software excels in producing diverse and real-time customised reports, utilising advanced filtering capabilities and toggles for precise, information presentation. These reports encompass a wide range of data, including, but not limited to, validation and revalidation documents, programme specifications, and module outlines, amongst others. Moreover, for enhanced convenience and record-keeping, users can export these reports into PDF format or to other software utilised to undertake further analysis ensuring straightforward sharing and accessibility.
Reporting types
  • API access
  • Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
From the service interface, users can select parameter ranges and download and export their data themselves in various file formats, including CSV and XLS.
Data export formats
  • CSV
  • Other
Other data export formats
  • XLSX
  • XLS
Data import formats
  • CSV
  • Other
Other data import formats
  • TXT
  • XLS
  • XLSX

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Included in our standard SLA, is a guaranteed uptime availability of 99.5 %.

We provide compensation credits in the rare event that our uptime SLAs are not met. In such instances, clients are entitled to a reduction in fees for the Services corresponding to the duration of the affected service level. Up time is measured at the outbound internet access point, ensuring transparency and accuracy in our service monitoring.
Approach to resilience
TimeEdit’s data centre resilience setup is available upon request.
Outage reporting
In the unlikely event of an outage, this is communicated through messages (clients can decide format of receiving this message) via our public dashboard, accessible to all clients for monitoring, and via the API.

Identity and authentication

User authentication needed
Yes
User authentication
Public key authentication (including by TLS client certificate)
Access restrictions in management interfaces and support channels
Access to management-only areas are part of an extended permission level hierarchy that is set up for all users.
Access restriction testing frequency
At least once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
A3CERT
ISO/IEC 27001 accreditation date
07/03/2024
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
TimeEdit is committed to preserving the confidentiality, integrity and availability of all the physical and electronic information assets (information assets include data or other knowledge stored in any format on any system that has value to an organisation, and should be logged) throughout the organisation in order to compete in the marketplace and maintain its legal, regulatory and contractual compliance and commercial image.
To achieve this, TimeEdit has implemented a policy framework in accordance with the international standard ISO/IEC 27001:2013 requirements, which we've also been certified to uphold. The policy is subject to systematic review and improvement at least on a 12 month basis.

The senior management team is responsible for setting and approving the
Information Security Policy. The VP of Engineering is responsible for ensuring that roles, responsibilities and authorities are appropriately assigned, maintained and updated as necessary. All employees and those working under the scope of the Information Security Policy are responsible for adhering to the requirements of the Information Security Policy and for fulfilling any duties related to assigned roles, responsibilities or authorities. The consequences of breaching the Information Security Policy are set out in TimeEdit’s disciplinary policy and in contracts and agreements with third parties.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All information system terminals, as well as key information flow points on the network are protected by continuous defence against malware/antivirus/spyware and other known malicious attacks. These defence mechanisms are updated without the need for end-user intervention, and end-users are restricted from accessing or making changes to the defence mechanisms.

Event logging is maintained at all applicable levels, capturing all the required events. Systems shall be patched and updated as new security patches and hotfixes are released. Any software or hardware product that reaches the end of the manufacturers’ service and support life for patching will be replaced.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
An incident is an event that violates the policies of TimeEdit related to Information Security, Physical Security, or Acceptable Use; other TimeEdit policy, standard, or code of conduct; or threatens the confidentiality, integrity, or availability of information systems. Incidents are categorised according to potential for exposure of protected data or criticality of the resource, using a four level system of Low, Medium, High, and Extreme.

Patches are deployed within one working day of a threat being identified by TimeEdit personnel, software application analysing events and trends, our Intrusion Protection/Intrusion Detection devices, or user observation of suspicious activity.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Means by which compromise are detected include:
Trained personnel reviewing collected event data;
Software applications analysing events, trends, and patterns;
Intrusion Protection/Intrusion Detection devices alert of unusual network traffic;
Observation of suspicious or anomalous activity.

At the detection of an incident, we will:
Detect whether a security incident has occurred;
Determine method of attack;
Determine impact of the incident to systems, applications, and personnel involved in the incident;
Obtain or create intelligence products regarding attack modes and methods.

Incidents are categorised according to criticality using a four level system.

Action will be taken within 24 working hours in all categories.
Incident management type
Supplier-defined controls
Incident management approach
TimeEdit’s Incident Response Life Cycle consists of a series of phases that will assist in the handling of a security incident. Preparation includes a variety of policies, procedures, tools, as well as governance and communications plans. TimeEdit utilises several mechanisms to prevent and prepare to respond to an incident:
Security awareness training;
Malware/Antivirus/Spyware Protections;
Firewalls and Intrusion Prevention Devices;
Event logs;
Patching and updating.

Means by which detection occur include:
Trained personnel reviewing collected event data;
Software applications analysing events, trends, and patterns of behavior;
Intrusion Protection/Intrusion Detection devices alert of unusual network traffic;
Observation of suspicious or anomalous activity.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Tackling economic inequality

TimeEdit actively tackles economic disparity through its dedication to equitable employment practices and community involvement. By committing to policies that guarantee at least a living wage for all employees, TimeEdit exceeds mere adherence to minimum wage regulations, striving to enhance the financial stability of its workforce. Furthermore, TimeEdit diligently combats economic inequality within our organisation by employing thorough internal protocols for salary adjustments. These protocols aim to base pay increases on objective measures such as skills, involvement, and performance, eschewing factors like race, gender, or other irrelevant criteria. By adopting a transparent and equitable method for determining wages, TimeEdit ensures fair compensation for all staff members. The annual salary review includes a specific examination to identify any trends in pay inequality, reinforcing our commitment to our principles. Through these initiatives, TimeEdit opposes systemic prejudice, fostering a culture of meritocracy and equal opportunity.

Equal opportunity

TimeEdit's recruitment processes are meticulously designed to prioritise skills, experience, and role compatibility, to effectively navigate and sidestepp biases linked to race, age, gender, culture or religion. This approach cultivates a diverse and inclusive work environment but also advocates for equal opportunities within our community. Through these strategies, TimeEdit contributes significantly to diminishing economic disparities and works strives towards achieving a more equitable society.

Wellbeing

TimeEdit prioritises employee well-being by promoting a 'context over control' work environment, emphasising flexibility and autonomy. Believing work should accommodate employees' personal lives for their physical and mental well-being, TimeEdit allows team members to tailor their work to fit their individual needs and preferences. Additionally, TimeEdit encourages active lifestyles with annual wellness grants for gym memberships or similar activities, supporting both physical health and mental relaxation. Furthermore, TimeEdit promotes a healthier, sustainable lifestyle by offering bicycle leasing, encouraging an active commute and reducing environmental impact. This initiative provides a greener travel option, enhancing weekend leisure as well.

Pricing

Price
£30 to £50 a licence a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at matt.dalton@timeedit.com. Tell them what format you need. It will help if you say what assistive technology you use.