MyTimeKeeper
MyTimeKeeper is a concept initially developed to solve a real-life issue for a management consultancy: a requirement to track team members' time and expenses on a project-by-project basis cost-effectively, where approvals are by project.
Features
- Mobile friendly (access from anywhere)
- Real time reporting
- Create unlimited projects with unlimited tasks
- API for report extract to financial systems
- Configurable workflows
- Secure (complex password)
- Multiple approvers by project
- Data visible by role type
Benefits
- Input information on the go from
- Real time see time spent in pending/approved
- Manage resource based on workers utilised time
- Multiple role types - act on what is required
- Create an invoice directly from the approved timesheets
Pricing
£3.99 to £5.99 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 7 8 1 6 3 4 3 4 0 2 5 9 1 7
Contact
My Time Keeper
Hamza Jamil
Telephone: 07881606165
Email: hamza.jamil@zebrahealthcare.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No. Our solution is fully cloud-based and accessible from any browser.
- System requirements
-
- Internet connection
- Any supported browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
P1 - System down: within one hour.
P2 - System not operating as expected: within 24 hours.
P3 - System enhancement: first response within 48 hours. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- We use industry-leading solutions for our customer support provided by Zendesk (https://www.zendesk.co.uk/).
- Onsite support
- No
- Support levels
- All our support is at no additional cost. An account manager is assigned, and we provide web-based training and show-and-tell support to help users navigate the system if needed.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Online training videos are provided after logging in. If required, the account manager will work with the client to organise a web-based training session bespoke for the needs.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- A ticket is raised and the team will coordinate how data needs to be shared with you, e.g., saved to a secure cloud location or on physical media,
- End-of-contract process
- There is no additional cost for exiting a contract. All data is destroyed as per the requirements of the client.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Timesheet creation and submission have all been designed with responsive controls to be accessible from any mobile or tablet browser.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- The system has been designed with an open API approach, as such we can configure the solution to ingest or export as needed.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- We are cloud-based, and our architecture uses elasticity to scale automatically. We are also multi-node.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
1) System uptime
2) System health
3) User engagement - Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Only report data is exportable by users with the correct role type. Export can be automated or downloaded as a CSV,
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Covered Service will provide a Monthly Uptime Percentage to Customer of at least 99.95%.
Refunds are applicable if we have a service down during UK business hours for more than one full business day. We will refund pro rata. - Approach to resilience
- Available on request.
- Outage reporting
- Email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We have multiple role types. A user can have one or more roles assigned. A role can only be assigned by a user with System Admin level access.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- https://cloud.google.com/security/compliance/iso-27001/
- ISO/IEC 27001 accreditation date
- Available on request
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- On requst
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- N/A
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- STRIPE
- PCI DSS accreditation date
- On request
- What the PCI DSS doesn’t cover
- N/A
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Google Cloud
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- Policies are available on request. They regularly reviewed in light of any changes within this sphere. Board-level sign-off is required to make any amendment.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Full details are available on request. However, we utilise multiple backups with an instant roll-back if needed.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We rely on our cloud-based provider. Patches are deployed through our regular timetable outside of UK core business hours except for a security-critical patch.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We respond immediately to any compromises. Depending on the severity, our approach may involve a system lock-down to prevent any potential threats. Our detailed process is documented and available on request.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incidents can be reported by email, chat or phone.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Wellbeing
Fighting climate change
We are elimating the need for paper to track time. Limiting the need for using expensive hardware as we are cloud based.Covid-19 recovery
Manage C19 projects and utilise your staff as best need.Wellbeing
As a time tracker it allows the user and the manager to have realtime data on their utilisation and on what projects. This enables discussion and change as required.
Pricing
- Price
- £3.99 to £5.99 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We provide a 90-day trial for 10 users. Users in this instance are workers and we only charge for workers, i.e., you can have multiple approver and reviewers during the trial. All services are available through the trial.