Higher Education Workload Management Software
TimeEdit delivers a user-focused Workload Management solution, offering comprehensive management capabilities (including creation, budgeting, scenario planning and vacancy overviews) through a SaaS model.
This solution empowers clients with improved transparency, streamlined operations, resource efficiency, and provides enhanced financial visibility over their academic workload planning, management and delivery.
Features
- Dynamic system accessibility from any browser on any device
- High system stability ensures reliable, uninterrupted service
- Real-time reporting or export data to use with in-house tools
- API available for up and downstream integrations
- Natively integrated with other TimeEdit modules
- Detailed audit functionality: time, date and user information
- In-built SSO integration
- Adaptable and robust platform with integrated tools
- Live, current data ensures users see accurate system information
Benefits
- Web-based workload management tool
- Infinitely customisable workload management workflows tailored to your requirements
- Workflow status updates ensure users stay informed on processes
- Efficient workload management, building on last year's data
- Dynamic Staff Student Ratio calculations
- Real-time flexible reporting to empower users
- Subject, School, Department, and Faculty staffing resource overviews
- Scenario planning and costings
- Financial oversight of programme, course and module resource delivery costs
Pricing
£30 to £50 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 4 3 6 7 6 1 2 4 2 8 5 4 9 5
Contact
TIMEEDIT UK LIMITED
Matt Dalton
Telephone: 07742183278
Email: matt.dalton@timeedit.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- TimeEdit offers unrestricted service, ensuring 99.95% reliability. Any planned maintenance is carefully planned for non-business hours and is brief, typically lasting just a few minutes, to ensure minimal disruption to the user experience. Fully compatible with all major web browsers, TimeEdit eliminates the need for specific hardware. The system will be available 24 hours a day, 7 days a week, excluding planned maintenance, guaranteeing continuous accessibility for our clients.
- System requirements
- Web browser (Safari, Chrome, Firefox & Edge)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- TimeEdit's email and ticketing support system accepts submissions 24/7, year-round. Live support for tickets operates from 9am to 5pm on weekdays, barring holidays. During these hours, our team aims to respond initially within 1.21 hours.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Our standard support package, included with every license, guarantees access to our engineers and support team during your business hours (9am to 5pm, weekdays).
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Training on using TimeEdit is always included for different user groups in our setup. This training is available both online and in person, with a mix of the two often yielding the most effective implementation. The exact blend is tailored to the clients individual needs. Both new and established users gain access to our comprehensive knowledge base, which includes user manuals, support queries, and training materials for all our software. If users require information beyond what's available, our dedicated support team is just a phone call away. Additional training sessions can be arranged anytime with our Customer Success Team.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- DOCX
- End-of-contract data extraction
- Users have the ability to export all data input into the TimeEdit system via a file export. Clients can perform this export independently or may seek assistance from our support team.
- End-of-contract process
- Upon contract termination, we will transfer all data to the client upon request and conduct a thorough deletion of the client's content, ensuring no possibility of restoration. We do not retain any backup files, as stipulated in the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- TimeEdit supports and is compliant with standardised web and enterprise technologies, rendering a completely device-agnostic experience. Leveraging cross-browser and platform compliant HTML5 standards, TimeEdit provides compatibility with all major browsers (Edge, Firefox, Safari, Chrome), as well as both desktop and laptop computers, tablets, and mobile phones.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- TimeEdit's interface, innovatively designed for ease and user engagement, enables users to quickly become proficient shortly after completing their training. With a focus on intuitive design, it integrates visual and interactive elements for straightforward navigation, further supported by instructional videos to ensure a smooth user experience. Delivered as SaaS, our applications are entirely web/HTML5-based, ensuring compatibility across desktops, laptops, mobile phones, and tablets.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
TimeEdit provides multiple API interfaces depending on the individual use-case and customer preference. At the basic level, TimeEdit provides both a SOAP and REST API that - depending on authentication - provides access to both public and private data. These interfaces can either be accessed as is (via standard HTTP(S) calls), or through one of TimeEdit’s integration interfaces. The APIs accept xml as input and output formats, and - for certain calls - multipart form data in the form of e.g., CSV or xlsx.
All APIs enable full read / write access to the the server and database, depending on the privileges and permissions specified by the authentication. Generally speaking, the APIs allow the user full programmatic access to all of TimeEdit’s functionality.
TimeEdit provides comprehensive API documentation, accessible via https://timeedit.readme.io/, which provides complete coverage of all our APIs and integration interfaces. This online resource includes detailed explanations, as well as practical examples, to assist users in understanding and utilising the platform's API capabilities effectively. All APIs are owned and maintained by TimeEdit and TimeEdit follows standard release protocols and API versioning so as to avoid introducing breaking changes that would adversely impact existing integrations. - API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- TimeEdits product suite can be customised to a granular level. Some examples are, the interface can reflect your branding, including logos, text and colour palette. In-system user-defined fields can be structured following your data module, configure to your naming conventions, determine whether fields are mandatory or optional, and control field visibility based on the user's role profile.
Scaling
- Independence of resources
- TimeEdit can guarantee no slowdown or restrictions by having multiple users accessing the service at the same time. This is achieved through automatic scaling of server capacity, logical route backups, and failover management such as established redundancy and abstraction. This has led to our average up-time of 99.99%.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Our software excels in producing diverse and real-time customised reports, utilising advanced filtering capabilities and toggles for precise, information presentation. These reports encompass a wide range of data, including, but not limited to, validation and revalidation documents, programme specifications, and module outlines, amongst others. Moreover, for enhanced convenience and record-keeping, users can export these reports into PDF format or to other software utilised to undertake further analysis ensuring straightforward sharing and accessibility.
- Reporting types
-
- API access
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- From the service interface, users can select parameter ranges and download and export their data themselves in various file formats, including CSV and XLS.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLSX
- XLS
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- TXT
- XLS
- XLSX
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Included in our standard SLA, is a guaranteed uptime availability of 99.5 %.
We provide compensation credits in the rare event that our uptime SLAs are not met. In such instances, clients are entitled to a reduction in fees for the Services corresponding to the duration of the affected service level. Up time is measured at the outbound internet access point, ensuring transparency and accuracy in our service monitoring. - Approach to resilience
- TimeEdit’s data centre resilience setup is available upon request.
- Outage reporting
- In the unlikely event of an outage, this is communicated through messages (clients can decide format of receiving this message) via our public dashboard, accessible to all clients for monitoring, and via the API.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Public key authentication (including by TLS client certificate)
- Access restrictions in management interfaces and support channels
- Access to management-only areas are part of an extended permission level hierarchy that is set up for all users.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- A3CERT
- ISO/IEC 27001 accreditation date
- 07/03/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
TimeEdit is committed to preserving the confidentiality, integrity and availability of all the physical and electronic information assets (information assets include data or other knowledge stored in any format on any system that has value to an organisation, and should be logged) throughout the organisation in order to compete in the marketplace and maintain its legal, regulatory and contractual compliance and commercial image.
To achieve this, TimeEdit has implemented a policy framework in accordance with the international standard ISO/IEC 27001:2013 requirements, which we've also been certified to uphold. The policy is subject to systematic review and improvement at least on a 12 month basis.
The senior management team is responsible for setting and approving the
Information Security Policy. The VP of Engineering is responsible for ensuring that roles, responsibilities and authorities are appropriately assigned, maintained and updated as necessary. All employees and those working under the scope of the Information Security Policy are responsible for adhering to the requirements of the Information Security Policy and for fulfilling any duties related to assigned roles, responsibilities or authorities. The consequences of breaching the Information Security Policy are set out in TimeEdit’s disciplinary policy and in contracts and agreements with third parties.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All information system terminals, as well as key information flow points on the network are protected by continuous defence against malware/antivirus/spyware and other known malicious attacks. These defence mechanisms are updated without the need for end-user intervention, and end-users are restricted from accessing or making changes to the defence mechanisms.
Event logging is maintained at all applicable levels, capturing all the required events. Systems shall be patched and updated as new security patches and hotfixes are released. Any software or hardware product that reaches the end of the manufacturers’ service and support life for patching will be replaced. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
An incident is an event that violates the policies of TimeEdit related to Information Security, Physical Security, or Acceptable Use; other TimeEdit policy, standard, or code of conduct; or threatens the confidentiality, integrity, or availability of information systems. Incidents are categorised according to potential for exposure of protected data or criticality of the resource, using a four level system of Low, Medium, High, and Extreme.
Patches are deployed within one working day of a threat being identified by TimeEdit personnel, software application analysing events and trends, our Intrusion Protection/Intrusion Detection devices, or user observation of suspicious activity. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Means by which compromise are detected include:
Trained personnel reviewing collected event data;
Software applications analysing events, trends, and patterns;
Intrusion Protection/Intrusion Detection devices alert of unusual network traffic;
Observation of suspicious or anomalous activity.
At the detection of an incident, we will:
Detect whether a security incident has occurred;
Determine method of attack;
Determine impact of the incident to systems, applications, and personnel involved in the incident;
Obtain or create intelligence products regarding attack modes and methods.
Incidents are categorised according to criticality using a four level system.
Action will be taken within 24 working hours in all categories. - Incident management type
- Supplier-defined controls
- Incident management approach
-
TimeEdit’s Incident Response Life Cycle consists of a series of phases that will assist in the handling of a security incident. Preparation includes a variety of policies, procedures, tools, as well as governance and communications plans. TimeEdit utilises several mechanisms to prevent and prepare to respond to an incident:
Security awareness training;
Malware/Antivirus/Spyware Protections;
Firewalls and Intrusion Prevention Devices;
Event logs;
Patching and updating.
Means by which detection occur include:
Trained personnel reviewing collected event data;
Software applications analysing events, trends, and patterns of behavior;
Intrusion Protection/Intrusion Detection devices alert of unusual network traffic;
Observation of suspicious or anomalous activity.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
TimeEdit actively tackles economic disparity through its dedication to equitable employment practices and community involvement. By committing to policies that guarantee at least a living wage for all employees, TimeEdit exceeds mere adherence to minimum wage regulations, striving to enhance the financial stability of its workforce. Furthermore, TimeEdit diligently combats economic inequality within our organisation by employing thorough internal protocols for salary adjustments. These protocols aim to base pay increases on objective measures such as skills, involvement, and performance, eschewing factors like race, gender, or other irrelevant criteria. By adopting a transparent and equitable method for determining wages, TimeEdit ensures fair compensation for all staff members. The annual salary review includes a specific examination to identify any trends in pay inequality, reinforcing our commitment to our principles. Through these initiatives, TimeEdit opposes systemic prejudice, fostering a culture of meritocracy and equal opportunity.Equal opportunity
TimeEdit's recruitment processes are meticulously designed to prioritise skills, experience, and role compatibility, to effectively navigate and sidestepp biases linked to race, age, gender, culture or religion. This approach cultivates a diverse and inclusive work environment but also advocates for equal opportunities within our community. Through these strategies, TimeEdit contributes significantly to diminishing economic disparities and works strives towards achieving a more equitable society.Wellbeing
TimeEdit prioritises employee well-being by promoting a 'context over control' work environment, emphasising flexibility and autonomy. Believing work should accommodate employees' personal lives for their physical and mental well-being, TimeEdit allows team members to tailor their work to fit their individual needs and preferences. Additionally, TimeEdit encourages active lifestyles with annual wellness grants for gym memberships or similar activities, supporting both physical health and mental relaxation. Furthermore, TimeEdit promotes a healthier, sustainable lifestyle by offering bicycle leasing, encouraging an active commute and reducing environmental impact. This initiative provides a greener travel option, enhancing weekend leisure as well.
Pricing
- Price
- £30 to £50 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No