Skip to main content

Help us improve the Digital Marketplace - send your feedback

The Future Fox Ltd

ConsultAI

ConsultAI is an AI-powered platform that delivers statistically robust analysis of consultation feedback. It offers thematic coding of text comments, summaries of long responses, and automated ready-to-use reports. The platform transforms the efficiency and accuracy of public consultation analysis, making it an invaluable asset for all public sector organisations.

Features

  • Code and summarise text comments
  • Specify themes or discover new ones with AI
  • Comprehensive automated reporting with custom branding
  • Supports multiple input sources: surveys, emails, pdfs, documents
  • Compatible with various third-party survey platforms
  • Transparent AI operations: trace results back to source comments
  • Real-time status dashboard for data and insights monitoring
  • Human-in-the-loop and traceable results for quality assurance
  • Fast processing within 24 hours

Benefits

  • Save £3k-£15k per consultation; reduce weeks of analysis time
  • For consultations on Local Plans, planning applications, transport, active travel
  • Create Cabinet-ready and public-facing reports
  • Streamline consultation analysis to boost productivity across the organisation
  • Boost decision-making with quick, accurate data interpretation
  • Cyber security and data protection controls

Pricing

£4,300 a licence a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hello@thefuturefox.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 5 4 0 6 3 5 2 3 6 6 0 3 1 5

Contact

The Future Fox Ltd Bobbi Taylor
Telephone: 02080580584
Email: hello@thefuturefox.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
No
System requirements
  • Internet connection
  • Web browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Assistance requests logged and initiated within 1 business day. Response to question within 48 hours Monday-Friday.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Conduct regular research with agents, admins and end users who rely on assistive technology - under routine product testing.
Capture feedback from customers to inform improvements.
Onsite support
No
Support levels
Access email support during office hours via the help button. Assistance requests logged and initiated within 1 business day.
All requests are handled via a Customer Success Manager with input from the technical team.
Additionally, service levels can be agreed upon based on support requirements as outlined in the Pricing Document, and our SFIA rates.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
A customer success manager will demonstrate the use of the platform at onboarding. Documentation, training materials and online support is available thereafter.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
Administrators with relevant permission level can export all project data from the dashboard at any time.
End-of-contract process
At the end of the contract the customers will have the option to request an extension of the service (for a supplementary fee) with a minimum 30 days notice. Should the contract not be extended, all buyer data will be removed within 60 days. A phone interview will be organised with the client to assess the quality of the service provided and to identify areas of improvement.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
No difference in functionality. Layout depends on screen size.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
No
Customisation available
Yes
Description of customisation
The platform allows users to set custom branding and upload their own logo. Automated reports and exports are generated in Word and Excel formats to allow further customisation.

Scaling

Independence of resources
The platform is designed to be distributed across multiple machines.

Analytics

Service usage metrics
Yes
Metrics types
Input data counts
Reports generated
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Approved administrators can export data and reports at any time using the platform controls.
Data export formats
  • CSV
  • Other
Other data export formats
  • Xlsx
  • Docx
Data import formats
  • CSV
  • Other
Other data import formats
Xlsx

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9% uptime guaranteed
Pro rata refund unless otherwise agreed in Ts and Cs
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
The management interface is MFA password protected and all passwords are stored in encrypted form. Role-based access control (RBAC) is implemented for data types and project types, with all access reviewed quarterly. Access and action logs are maintained and viewable to top level administrators. Support channels are encrypted and logged.
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We follow ISO 27001 principles. Policies, including Cyber Security Policy and a Data Breach Policy, are monitored, reviewed and reported on a quarterly basis by the CEO to the Board. Security governance extends across various domains of our operations. It includes the integration of security considerations into product design, ensuring that security is a foundational aspect of our products throughout their lifecycle. In maintenance and operations, we apply these policies to manage and mitigate risks, ensuring operational continuity and security. We also apply these policies across HR, such as employee onboarding, personal development, training, and compliance with security standards.
Information security policies and processes
Our InfoSec processes are designed to minimise risk. The CEO is responsible for ensuring policies are followed and reports quarterly.
Specifically we:
- implement best practise password methods ie use a password manager, use secure passwords, enable MFA
- implement user permissions levels to minimise exposure to data when it is not required.
-enable device protection
-enable MFA for cloud services

We are Cyber Essentials Plus certified and registered with the ICO.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We use source control (git) to track changes to the system. We use browser automation testing and a staging server to test the system before making any changes live. Each change is reviewed at specification and testing stages before release against the technical risk register which includes security considerations.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We have automated vulnerability testing for basic threats, and all software packages are kept up to date. For known vulnerabilities, the maximum response time is 4 hours to contain the threat and design a hotfix, before implementing an investigation and consequential actions. We also receive real-time security update notifications from Operating System providers and cloud services.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our system has built-in alerts for common compromise indicators which alert our staff who then assess and attempt to remedy the situation using information in the log files and other sources. Incidents are prioritised within 4 hours and high priority incidents are dealt with immediately. Our Incident management policy covers 4 steps with roles and responsibilities: Containment and recovery,Investigation and risk assessment,Notification, Evaluation and response.
Incident management type
Supplier-defined controls
Incident management approach
Users can report incidents to us at any time through their account manager or the Help button, by email, phone or in person. These are logged and initiated within 4 working hours. Administrators are informed regularly of progress, according to severity. Once the incident is dealt with, an incident report is filed and provided to the relevant parties by email. Data breach incidents are managed following our Data Breach policy.

Our Incident management policy covers 4 steps with roles and responsibilities: Containment and recovery,Investigation and risk assessment,Notification, Evaluation and response.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our AI system runs on infrastructure that is already or will be carbon neutral by 2025.

The Future Fox measures and monitors its annual organisational carbon performance, and using carbon-neutral or approaching neutral cloud services and data processing power significantly enhances our performance. Other key actions for the company include travel minimisation and carbon offsetting, equipment longevity and reuse.

Equal opportunity

The Future Fox is an Equal Opportunities Employer. The organisation provides equal employment opportunities regardless of ethnic origin, gender, nationality, religion, physical ability, sexual orientation, marital status, parental status, or medical history. We operate a merit-based recruitment process and include accessible recruiting tools and methods. We regularly participate in get-into-work schemes like the Government's Kickstart scheme, Ukrainian workforce, military and student placement schemes, successfully providing training and support and placing candidates.

Wellbeing

Contract delivery includes community
integration through regular user and community end user testing, codesign of methodologies and with customers, and sharing of best practise and expertise with customers. This supports our company's mission to deliver social impact.

Pricing

Price
£4,300 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free trial for 25 comments

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hello@thefuturefox.com. Tell them what format you need. It will help if you say what assistive technology you use.