ConsultAI
ConsultAI is an AI-powered platform that delivers statistically robust analysis of consultation feedback. It offers thematic coding of text comments, summaries of long responses, and automated ready-to-use reports. The platform transforms the efficiency and accuracy of public consultation analysis, making it an invaluable asset for all public sector organisations.
Features
- Code and summarise text comments
- Specify themes or discover new ones with AI
- Comprehensive automated reporting with custom branding
- Supports multiple input sources: surveys, emails, pdfs, documents
- Compatible with various third-party survey platforms
- Transparent AI operations: trace results back to source comments
- Real-time status dashboard for data and insights monitoring
- Human-in-the-loop and traceable results for quality assurance
- Fast processing within 24 hours
Benefits
- Save £3k-£15k per consultation; reduce weeks of analysis time
- For consultations on Local Plans, planning applications, transport, active travel
- Create Cabinet-ready and public-facing reports
- Streamline consultation analysis to boost productivity across the organisation
- Boost decision-making with quick, accurate data interpretation
- Cyber security and data protection controls
Pricing
£4,300 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 5 4 0 6 3 5 2 3 6 6 0 3 1 5
Contact
The Future Fox Ltd
Bobbi Taylor
Telephone: 02080580584
Email: hello@thefuturefox.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
-
- Internet connection
- Web browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Assistance requests logged and initiated within 1 business day. Response to question within 48 hours Monday-Friday.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
-
Conduct regular research with agents, admins and end users who rely on assistive technology - under routine product testing.
Capture feedback from customers to inform improvements. - Onsite support
- No
- Support levels
-
Access email support during office hours via the help button. Assistance requests logged and initiated within 1 business day.
All requests are handled via a Customer Success Manager with input from the technical team.
Additionally, service levels can be agreed upon based on support requirements as outlined in the Pricing Document, and our SFIA rates. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- A customer success manager will demonstrate the use of the platform at onboarding. Documentation, training materials and online support is available thereafter.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- Administrators with relevant permission level can export all project data from the dashboard at any time.
- End-of-contract process
- At the end of the contract the customers will have the option to request an extension of the service (for a supplementary fee) with a minimum 30 days notice. Should the contract not be extended, all buyer data will be removed within 60 days. A phone interview will be organised with the client to assess the quality of the service provided and to identify areas of improvement.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No difference in functionality. Layout depends on screen size.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
- The platform allows users to set custom branding and upload their own logo. Automated reports and exports are generated in Word and Excel formats to allow further customisation.
Scaling
- Independence of resources
- The platform is designed to be distributed across multiple machines.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Input data counts
Reports generated - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Approved administrators can export data and reports at any time using the platform controls.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Xlsx
- Docx
- Data import formats
-
- CSV
- Other
- Other data import formats
- Xlsx
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
99.9% uptime guaranteed
Pro rata refund unless otherwise agreed in Ts and Cs - Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- The management interface is MFA password protected and all passwords are stored in encrypted form. Role-based access control (RBAC) is implemented for data types and project types, with all access reviewed quarterly. Access and action logs are maintained and viewable to top level administrators. Support channels are encrypted and logged.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We follow ISO 27001 principles. Policies, including Cyber Security Policy and a Data Breach Policy, are monitored, reviewed and reported on a quarterly basis by the CEO to the Board. Security governance extends across various domains of our operations. It includes the integration of security considerations into product design, ensuring that security is a foundational aspect of our products throughout their lifecycle. In maintenance and operations, we apply these policies to manage and mitigate risks, ensuring operational continuity and security. We also apply these policies across HR, such as employee onboarding, personal development, training, and compliance with security standards.
- Information security policies and processes
-
Our InfoSec processes are designed to minimise risk. The CEO is responsible for ensuring policies are followed and reports quarterly.
Specifically we:
- implement best practise password methods ie use a password manager, use secure passwords, enable MFA
- implement user permissions levels to minimise exposure to data when it is not required.
-enable device protection
-enable MFA for cloud services
We are Cyber Essentials Plus certified and registered with the ICO.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We use source control (git) to track changes to the system. We use browser automation testing and a staging server to test the system before making any changes live. Each change is reviewed at specification and testing stages before release against the technical risk register which includes security considerations.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We have automated vulnerability testing for basic threats, and all software packages are kept up to date. For known vulnerabilities, the maximum response time is 4 hours to contain the threat and design a hotfix, before implementing an investigation and consequential actions. We also receive real-time security update notifications from Operating System providers and cloud services.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our system has built-in alerts for common compromise indicators which alert our staff who then assess and attempt to remedy the situation using information in the log files and other sources. Incidents are prioritised within 4 hours and high priority incidents are dealt with immediately. Our Incident management policy covers 4 steps with roles and responsibilities: Containment and recovery,Investigation and risk assessment,Notification, Evaluation and response.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Users can report incidents to us at any time through their account manager or the Help button, by email, phone or in person. These are logged and initiated within 4 working hours. Administrators are informed regularly of progress, according to severity. Once the incident is dealt with, an incident report is filed and provided to the relevant parties by email. Data breach incidents are managed following our Data Breach policy.
Our Incident management policy covers 4 steps with roles and responsibilities: Containment and recovery,Investigation and risk assessment,Notification, Evaluation and response.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
Our AI system runs on infrastructure that is already or will be carbon neutral by 2025.
The Future Fox measures and monitors its annual organisational carbon performance, and using carbon-neutral or approaching neutral cloud services and data processing power significantly enhances our performance. Other key actions for the company include travel minimisation and carbon offsetting, equipment longevity and reuse.Equal opportunity
The Future Fox is an Equal Opportunities Employer. The organisation provides equal employment opportunities regardless of ethnic origin, gender, nationality, religion, physical ability, sexual orientation, marital status, parental status, or medical history. We operate a merit-based recruitment process and include accessible recruiting tools and methods. We regularly participate in get-into-work schemes like the Government's Kickstart scheme, Ukrainian workforce, military and student placement schemes, successfully providing training and support and placing candidates.Wellbeing
Contract delivery includes community
integration through regular user and community end user testing, codesign of methodologies and with customers, and sharing of best practise and expertise with customers. This supports our company's mission to deliver social impact.
Pricing
- Price
- £4,300 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free trial for 25 comments