Interactive touch-screen kiosk journey planning software
Development and maintenance of bespoke online interactive touch-screen journey planning maps and resources for local authorities including public transport routes, times and fares and local walking and cycling route and information. Ability to provide as standalone or as part of a supplied kiosk solution and hosted entirely in-house.
Features
- Multi-modal real time journey planning
- Visualisation of geographic area and suggested routes
- Detailed place and address search
- Visualisation of public transport schedules
- Customisation of user location and search parameters
- Real time bus location and traffic conditions
- Ability to save journey itinerary results
- Inclusion of specific infrastructure e.g. cycle parking
- Zoomable display set to specified geographic boundaries
Benefits
- Use as software within a new or existing installation
- Ability to zoom in on current location
- Ability to blend multiple API sources into results
- Ability to visually display road closures
- One stop portal for all local public transport modes
- Ability to alter user behaviour
- Ability to export and adapt data for internal client use
- Better use and visulisation of existing local authority data
- Ability to focus on safe home to school transport
- Ability to adapt touch screen for users with impaired mobility
Pricing
£4,000.00 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 7 9 6 9 3 9 3 7 8 4 2 6 1 0
Contact
GRM MAPPING LIMITED
Mark Knowler
Telephone: 020 8242 6169
Email: enquiries@grmmapping.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
-
- Understanding of geographic area required
- Understanding of internal data sources available
- Understanding of key contacts in maintaining site accuracy
- Understanding of physical location of touch-screen
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- An initial response to issues raised within one hour Mondays to Fridays office hours and a commitment to monitor contact and respond as quickly as appropriate outside of these times.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Our commitment to all clients is to acknowledge and initially respond to issues and questions within one hour of contact on Mondays to Fridays 0900-1700hrs. Outside of these times we would regularly monitor any contact and respond as soon as is required or appropriate. The cost of support would be included within the contract price and would initially involve a nominated technical account manager.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- The key buyer representatives would be fully involved throughout the design and commissioning stages to ensure full transparency on data sources and accuracy and to be able to confidently navigate the site and promote it to public end users. User documentation and online training would be included as standard.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- As the software uses only publicly-available open data and operates in real time, there would be no data to extract when the contract ends. Any user or performance logs and analytics would be available up to the end of the contract.
- End-of-contract process
- The contract would include full maintenance, processing and support for the software until the specified end of contract and this is included within the price quoted. Any additional work required to hand over to a new supplier, or to extend temporarily until a new solution is live would be an additional cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- No
- Customisation available
- Yes
- Description of customisation
-
The buyer may customise the user interface and mapping in terms of visual palette, geo-referenced data scope and content and in determining which specific data sources are used for journey planning. This would be identified during the start-up phase prior to the public site going live.
End users may also customise their results by using their location services settings to return the most appropriate and timely responses to their queries ad also by sorting their journey results by key criteria including journey time, number of changes, cost, number of steps and CO2 emissions,
Scaling
- Independence of resources
- The entire product is hosted on our own dedicated web server, and as such the number of individual users or tasks being performed will not affect the performance experienced.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide a Web Log Analysis Report on all live sites to the buyer monthly or quarterly. This includes analysis of website activity including number of hits, page views, unique visitors and bandwidth usage.
- Reporting types
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- The exporting of data is limited purely to the end public user retaining the results of their journey query, and there is no need for any separate export by the buyer organisation themselves.
- Data export formats
- Other
- Other data export formats
- Data import formats
- Other
- Other data import formats
- XML
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Our SLAs are tailored to each client, and would describe the roles and responsibilities of all parties and stakeholders. As a standard, we guarantee 100% uptime of all software products within the core hours required by any client, and the scheduling of any planned maintenance or upgrades to take place outside of these hours.
Any disruption to service, planned or otherwise, would be responded to within one hour of discovery or contact by the client during our office hours, and on agreed timescales during out-of-hours periods. Escalation procedures and compensation for failure to meet key performance targets would be agreed with the client at beginning of contract and regularly reviewed during the contract lifetime. - Approach to resilience
- Detailed information on the location, functions and resilience of our datacentre setup is available on request.
- Outage reporting
- We have 24/7 access to a public dashboard for our datacentre operation which provides real-time indication of any service outage or security threat. This is then passed on to the end client within the terms of the Service Level Agreement, and updates towards resolution provided at frequent and timely intervals agreed with the client.
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- We utilise Role-Based Access Control (RBAC) to restrict access to management interfaces and support channels based on internal and external users' roles, responsibilities, and privileges.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
We have conducted a comprehensive risk assessment to identify potential security risks and vulnerabilities, including evaluating the likelihood and impact of cyber attacks and data breaches. Based on this, we have clear and concise security policies and procedures on access control, data protection, incident response, and compliance.
We maintain a robust incident response plan to mitigate security incidents when they might occur. This establishes clear roles and responsibilities and defines escalation procedures.
We regularly review and update our security policies and procedures, investing in new technologies and staying informed about emerging security trends and best practices - Information security policies and processes
-
Our nominated Director oversees and ensures compliance with our security policies and processes which are tailored to ensure our bespoke software solutions remain secure and compliant at all times for ourselves, our clients and end users.
We maintain and regularly review our Access Control Policy, Data Protection Policy, Incident Response Policy, Network and Physical Access Security Policies and Compliance Policy.
The latter is regularly reviewed and ensures that the organisation complies with relevant laws, regulations, and industry standards related to information security and privacy. It includes procedures for conducting regular compliance assessments, audits, and reporting requirements to demonstrate adherence to legal and regulatory obligations.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We maintain an inventory of all hardware, software, and network devices deployed within our workflows. This includes servers, workstations, routers, switches, firewalls, storage devices, and software applications. We regularly audit and review these configurations to ensure compliance with our security and resilience policies.
Within our formal processes for reviewing and approving change requests for IT systems and infrastructure, we obtain formal approval from relevant stakeholders before implementing changes with a guarantee to maintain the highest standards on security and availability. After implementing changes, post-implementation reviews evaluate their success, which enables us to extend any specific improvements to other clients. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Together with our dedicated server supplier, we conduct regular vulnerability assessments to identify weaknesses, misconfigurations, and security vulnerabilities across our IT infrastructure. We use automated scanning tools to detect vulnerabilities and security misconfigurations.
We actively implement a patch management process to address identified software and hardware vulnerabilities in a timely manner. This involves regularly applying security patches and updates provided by software vendors to reduce the risk of cyber attack.
We constantly monitor new vulnerabilities, emerging threats and changes to our IT environment. This includes monitoring security advisories and vendor announcements for information about new vulnerabilities and potential security risks. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Our continuous real-time monitoring processes collect and analyse security data for signs of unauthorised access, malware infections, data breaches, and other security incidents.
Within our agreed Service Level Agreement with our dedicated datacentre supplier and our clients, we have clear incident response procedures to respond to security incidents detected through protective monitoring within the shortest possible timeframe. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Once an incident is detected, it is classified into categories such as malware infections, unauthorised access, data breaches, denial-of-service attacks, or system outages. Users will be able to report such concerns directly through our established direct communication channels.
Once the incident is contained, a detailed investigation is conducted to determine the root cause, impact, and scope of the incident. Recovery is then undertaken to restore affected systems and data to a secure state.
Throughout the process, stakeholders are kept informed about the incident, its impact, and the ongoing response efforts as part of our Service Level Agreement.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Wellbeing
Fighting climate change
The promotion of, and easy access to, detailed real-time journey planning results that can be sorted by the mode with the lowest predicted CO2 emissions (for example highlighting walking and cycling over car usage).Covid-19 recovery
The ability to promote the Government's £2 maximum bus fare cap and other Bus Service Improvement Plan projects in promoting the bus as a sustainable travel choice and to aid in returning usage to pre-pandemic levels.Tackling economic inequality
The ability to break down perceived barriers in access to employment for those reliant on public transport, both in terms of availability and cost.Wellbeing
The promotion of walking and cycling as sustainable, healthy modes of travel both for work and leisure purposes, and the ability to compare number of steps and calories used across all modes for any particular journey.
Pricing
- Price
- £4,000.00 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No