Evaluate
Evaluate™ is a simple to use, global job evaluation and architecture tool guiding you through JD creation, job evaluation and levelling through to organisation design. Using factors to determine the relative value of different roles within your organisation you are able to defensibly place roles into clearly defined levels.
Features
- Defined, objective and transparent framework for career development
- Robust data analytics around organisational structure
- Create your existing and aspirational organisational shape
- Create and store your job description library within the system
- Identify areas of risk through Work of Equal Value criteria
- Overlay gender and ethnicity data on your organisational structure
- Real-time reporting
- Compare roles by title, department, function, location, score etc.
Benefits
- Complies with Equal pay requirements
- Simple to use, no previous job evaluation experience required
- Create departmental efficiencies, complete evaluations quickly and easily
- Give confidence to line managers with consistent & transparent evaluations
- Create & download dynmaic visuals and reports
- View and print an instant summary of job evaluations
- Report your gender pay gap with greater granularity
- Identify high performers, flight risks and past glories
- Foundation to create performance management processes
- Identify gaps and areas of risk within your organisation
Pricing
£25,000 to £97,000 a unit a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 5 3 9 8 1 2 8 4 3 0 7 5 3 3
Contact
Innecto Reward Consulting
Karen Thornley
Telephone: 07979800886
Email: karen.thornley@innecto.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
A standalone solution sitting on the Innecto Digital platform that can be connected to our other tools:
PayLab (Pay benchmarking and insight tool)
Advance (Pay Review Modelling)
Flourish (Competency Framework)
Amplify (Employee Experience) - Cloud deployment model
- Private cloud
- Service constraints
- No specific constraints. Monthly upgrades occur with occasional hotfixes between the upgrades. Generally upgrades and fixes require no downtime, but if it is then customers are notified and generally it's limited to a 15-30 minutes
- System requirements
- Web browser that is under software support
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We aim to respond within 2 hours for all emails sent to support between the hours of 8.30am-5.30pm Monday to Friday. Out of hours support can be provided but at an extra cost
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- We haven't had the service checked for accessibility, however it is a standard chat package from a well-known provider. However, we will investigate accessibility further.
- Web chat accessibility testing
- None.
- Onsite support
- Yes, at extra cost
- Support levels
- Each customer will have a dedicated account manager and access to the Innecto support desk, Mon – Fri, 9-5 GMT. Both liaise with the technical staff as needed. This support is included in the price quoted. Additional costs are only required if the customer asks for specific, additional technical development of the platform or extended coverage
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We typically hold a scoping meeting to clarify and define the support requirements, including training. Once the system is configured we complete handover of the tool and run training sessions. During these sessions anchor roles are identified and evaluated providing the foundation to evaluate the wider company.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users download/export their data into an excel data sheet that includes all the aggregated data inputted into the system, and they are able to download a PDF report including images and tables
- End-of-contract process
- Contracts are typically on a rolling basis unless notice is served. If your contract is terminated, you will be given notification of your last day of access and prior to this period will be able to download relevant data. At the point access is removed your account will be closed.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Functionality remains the same but the screen layout differs
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- Yes
- Description of customisation
-
There is a standard level of customisation offered during the configuration of the solution including branding and amending the following data fields as required:
Structure / company breakdown
Number of Users
Grading system
Scaling
- Independence of resources
- Our service is multi-tenanted, but it is hosted on Amazon's elastic cloud service and we monitor performance and overall usage very closely. If performance is falling off below permitted parameters we can deploy extra servers and bandwidth as needed.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Time on the system
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Download into a CSV file
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We aim to make Evaluate available 24 hours a day, 7 days a week, whilst this availability is not guaranteed, we do commit to 99.95% uptime. Priority 1 (service down) SLA is a maximum of 8 hours recovery time. Refunds to users not meeting SLA's are specified in the Terms and Conditions.
- Approach to resilience
- We have separate development, test and production environments on AWS. The production environment hardware is replicated across AWS data centres in the UK for resiliency in the event of a failure. Each production environment consists of multiple, load balanced servers.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Other user authentication
- SAML2 SSO
- Access restrictions in management interfaces and support channels
- VPN & trusted IP only
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Isoquar - Alcumuc
- ISO/IEC 27001 accreditation date
- October 2012
- What the ISO/IEC 27001 doesn’t cover
-
The people, processes and technology used to develop, deliver or support the delivery of insurance, employee engagement and reward consultancy services provided to our clients from our offices in Milton Keynes and Marlborough.
AWS who host our solutions are also ISP certified - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- WorldPay
- PCI DSS accreditation date
- Feb 2020
- What the PCI DSS doesn’t cover
- Up to SAQ-D
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials Plus
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Innecto Reward Consulting are part of the AIM listed Personal Group and have an associated corporate governance structure including main board and risk compliance committees. We have numerous policies approved by these and implemented; Data Policy, Information and Physical security, Cyber security, Clear desk policy and other relating to recruitment, staff vetting and training.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Platform and functionality changes are managed on a ticketing system (Jira), each are assessed for effort, risk and business impact. Estimates are provided, each development is made in a separate development environment with unit testing. Code is then promoted to a full test environment where full regression testing is performed prior to release to production.
Requests that require the transfer of sensitive data are actioned through an online secure data storage site to guarantee safe transfer of data - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Approach Information on threats come from a number of sources; NCSC, 3rd party virus protection vendor, software suppliers, vulnerability scanning that is performed monthly and penetration testing. We access threats as part of a continuous security management programme and deploy patches in most cases immediately after release. Patches that are deemed low priority / require regression testing are schedules as part of our monthly release.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Monitoring of attempted logins, failed logins, successful logins, source IP addresses, IP address risk ratings, firewall probes. In addition, virus scanners and mail gateway services are constantly running, monitoring and reporting activity. We review daily and if deemed appropriate a security incident procedure is instantiated. This will typically be within 24 hours.
- Incident management type
- Undisclosed
- Incident management approach
- Our suppliers use SOC2 processes and we use an internal ticketing system to report incidents. We have an internal Security Management Response policy and procedure along with Reportable Events Policy and Procedure
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Our robust system for evaluating jobs gives HR confidence that roles are being assessed fairly and consistently and enables HR to create a strong foundation to build an effective organisation.
Our market-leading tool also allows gender and ethnicity lenses, highlighting population clusters or gaps within your current organisational structure as well as the ability to map how to achieve an aspirational picture to aid Diversity and Inclusion strategies.
Role heat map reporting allows users to identify where roles are evaluated and compare across the organisation and understand where some levels are more populated than others.
Work of equal value flagging, and the generation of the ‘work of equal value’ report, allows roles that are falling inside and outside of this to be investigated to ensure roles are reflected without bias.
Pricing
- Price
- £25,000 to £97,000 a unit a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- We will provide a demo platform for a select number to trial the functionality and see the full capability of the solution. This however does require accurate data, supplied by the client to upload