Objective Keyplan for Collaborative Authoring, Consultation & Engagement
Objective Keyplan provides an integrated collaborative environment to develop policies and strategic plans utilising best practice content; provides a unified workspace, publishing and delivery services; and facilitates the involvement of stakeholders through real-time consultation, collaboration and engagement with local communities.
Features
- Consultation and Engagement Platform with Stakeholder Database
- Document Creation, Collaboration, Versioning and Multi-Authoring
- Dynamic Document and Web Publishing
- Integration through API with CRM and Line of Business Systems
- Consultation Portal including mobile support
- Comprehensive reporting on all event based consultations including surveys/polls
- Community Library of reusable best practice content for Government Agencies
- One click publishing including PDF, WCAG v2.1
- Templated design features allowing re-use and high quality publishing
Benefits
- Manage the way strategic documents are created, co-authored and managed
- High quality Organisation brand compliant content & Publishing
- Manage the entire lifecycle for Policy Development and Strategic Plans
- Manage the legislative process for Local Plans and Utilities (i.e.WRMP19)
- Manage consultations, stakeholder submissions and analysis of engagement
- Single consultee database to allow consultation and engagement across Government
- Multi-channel Engagement with Local Communities, Citizens, Businesses and Stakeholders
- Integrate Social Media Policy into Stakeholder Engagement
Pricing
£9,244 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 8 4 0 8 5 0 5 8 2 9 3 4 3 4
Contact
Objective Corporation Limited
Mat Graves
Telephone: +44 (0)118 2072300
Email: mat.graves@objective.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Community cloud
- Service constraints
- All planned downtime/maintenance is restricted to weekends or late at night when demand for the service is expected to be low. Notification is provided in advance to all customers to allow them time to plan any activity around the scheduled downtime
- System requirements
-
- Stakeholder Engagement roles require JavaScript
- Modern Browser support - see Service Definition for further details
- PDF Reader Required
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Standard Support and Premium Support are available dependent upon edition. Online Incident creation available 24/7 - Other support channels available Mon-Friday during Business Day Hours 8am-6pm. Full Service details are contained within the Keyplan Support Handbook
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard Support Hours are 09:00 to 17:00 Monday to Friday Excluding Public Holidays. Enhanced support is available including 07:00-19:00 and 24/5. • Up to four (4) named Support Contact accounts
• Access by Support Contacts to telephone support on Business Days between 8am and 6pm where the customer is located;
• Incident Priority Definitions and Incident Response and Resolution Targets (see Section 8);
• Incident resolution, escalation and reporting
• Extended support hours for Priority 1 Incidents (24x5 Monday to Friday, Business Days only);
• Objective will provide Priority 1 post-incident reports;
• Support Contact access to the portal to view Incidents and status;
• Incidents are managed by the Objective Global Support team, providing real-time updates of progress and the ability to negotiate incident priority levels;
• Assistance to Support Contacts in resolving Objective Keyplan technical issues such as applying certificates and installation assistance of new Objective Connect Link versions;
• Support Contacts are notified by email of updates and new releases of Connect. Connect enhanced support for Connect Link customers provide Target Levels 1-4 for Response and Resolution. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Objective offer a range of implementation services, which are defined in the SFIA Rate card price book. This includes system set-up, user and admin training. Our Consultation Institute (CI) accredited consultancy Professional Services team offers additional packages, such as, consultancy, best practise, design and delivery of event and/or collaborative documents if required.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
If a customer chooses to terminate their contract a three month notice period is required. At the end of this period:
• users will be deactivated
• the DNS will be deleted
• customer data will be deleted
Customers can export their data from the system using the following tools provided by the system:
• Stakeholder Management
• Run reports for consultees and comments
• Save as XML / CSV / HTML format
• Export Documents and supporting files
• Collaborative Authoring
• Export as zip file - individual XML content files plus images for documents
• Export as Entire PDF
Customers can use the service to carry out this work themselves or alternatively Professional Services can be engaged to carry out this work on a fee basis as per G-Cloud 12 SFIA Rate Card - End-of-contract process
-
Each party’s right to terminate is addressed in the Objective Keyplan terms and conditions of use.
Objective also has limited suspension rights as follows:
Objective may take the Application offline or filter or block the Customer’s access, without derogating from its right to terminate this Agreement and without liability for repudiation if:
1. the Customer fails or neglects to pay any outstanding invoice within seven (7) days of the date of a written demand for payment by Objective;
2. Objective is authorised or directed to suspend the Service by a government, administrative, regulatory and/or law enforcement agency to do so;
3. for the purpose of Scheduled Maintenance;
4. the presence of a Virus threatens the integrity of the Application, Customer Data and/or hosted environment; and
5. the Customer is reasonably believed to have undertaken any prohibited actions.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- We would recommend that the System Admin functionality is performed through a laptop/desktop computer. The citizen engagement portal is designed to work across multiple devices including; Smartphones, tablets and computers.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- Collaborative Authoring and Stakeholder Management can be used without any development or integration. It is however possible to integrate to our solutions using our Web Service API or via our RESTful HTTP interface. The Collaborative Authoring/Stakeholder Management web browser client uses these interfaces to make the application work. This means that any data set or function that is available within the application can be made available (subject to security and licensing) to other third-party applications.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Template branding for Collaborative Authoring. Custom defined Meta Data by the customer. Customer branding for integration with customer's website with Objective Professional Services.
Scaling
- Independence of resources
- We have an operational team that pro-actively monitors and plans demand and hence ensures the elasticity of the Keyplan solution. In addition, capacity management is performed for the application through the defined architecture, sizing and predicted customer demand through a multi-tenanted solution.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Service Metric reports via the Customer dashboard
From a Consultation Engagement Model - users can configure reports on different engagement events as part of the core functionality. - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
Customers can export their data from the system using the following tools provided by the system:
• Stakeholder Management
• Run reports for consultees and comments
• Save as XML / CSV / HTML format
• Export Documents and supporting files
• Collaborative Authoring
• Export as zip file - individual XML content files plus images for documents
• Export as Entire PDF
Customers can use the service to carry out this work themselves or alternatively Professional Services can be engaged to carry out this work on a fee basis. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- HTML
- Data import formats
-
- CSV
- Other
- Other data import formats
- HTML
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
- Other
- Other protection within supplier network
- IPC and message queues
Availability and resilience
- Guaranteed availability
- There is a target service level of 99.8% for the application.
- Approach to resilience
- Our global data centre and bandwidth supplier is AWS. Full redundancy is implemented throughout, including traffic re-routing to guarantee our services are delivered 24/7. Our data centres have a high level of security and resilience, with 24-hour air-conditioning power, UPS with emergency generators for backup, fire detection and suppression and security measures that include active security measures. Onsite facilities include heating, ventilation, air-conditioning and UPS are all configured to N+1 standards, which means that no single point of failure exists. UPS are backed up by onsite generators.
- Outage reporting
- Users can see service outages reported in the application.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Service management via bastion hosts and use of a VPN
- Access restriction testing frequency
- Less than once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau
- ISO/IEC 27001 accreditation date
- July 2018
- What the ISO/IEC 27001 doesn’t cover
- The scope of Objective's accreditation covers the following: The protection of data for the provision of specialist information management software solutions and services around content collaboration and process management to the corporate and public sector. Assets protected include all organisation data client data required for the delivery of services and supporting physical and cloud based IT infrastructure. Assets protected are within the physical locations internal networks external connectivity and remotely managed services within the control of Objective Corporation UK Ltd. in Accordance with Statement of Applicability Ver 1.3
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
All Objective staff in the UK are responsible for conforming to the security manual in all their work. The procedures which make up the Information Security Management System (ISMS) define specific responsibilities. The Objective UK Information Security Manager, who reports directly to the General Manager UK, is responsible for the ISMS design and development, liaison with external advice and guidance (e.g. interest groups, product user groups). He is responsible for:
• owning the ISMS and ensuring that it presents an integrated set of policies and controls which support Objective’s information security policy
• establishing information security objectives to support the policy, and controlling their achievement
• ensuring that any failures, events or improvement opportunities relating to information security are recorded and addressed as appropriate (including retention of records as required)
• maintaining the ISMS components in accordance with agreed improvements, and ensuring that they are implemented correctly
• ensuring that any resources required to support information security are identified and requested
• monitoring the system's effectiveness through audits and other measures
• ensuring compliance with the requirements of ISO 27001
• ensuring staff awareness of information security
• maintaining knowledge of information security good practice.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Change and configuration management procedures are followed to track service components throughout their lifecycle to ensure the network remains operational and stable at all times. No changes may be made to the IT infrastructure without the Systems Administrator’s approval. The Systems Administrator reviews and risk assesses changes for potential security impact and mitigates and manages appropriately before deployment onto live system environments
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Incidents are raised in response to threat identification and managed on a risk impact assessed basis and prioritised for response.
Patches are deployed and managed in accordance with defined processes with emergency patch processes defined for dealing with high impact / high priority incidents. Potential threats and threat actors are monitored and regularly reviewed as part of the regular review process. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- A multi-layered strategic approach exists to protect the data, network and laptop/desktops from Internet borne threats that uses: • Anti-virus and malware scanner software on laptops/desktops and servers to protect against virus and malware infections • Email filtering to prevent email based attacks delivered in the form of incoming spam mail. • A firewall regulates inbound and outbound traffic to protect against potential threats. • Anti-malware protection • Operating systems software is updated to address known vulnerabilities. Tickets are raised in response to an incident and prioritised for response based on risk assessment.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Users report and raise incidents through the Support Portal and tickets are raised to progress incidents. Each ticket is reponded to with details of root cause of the incident together with incident resolution details identified.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
Fighting climate change
Fighting climate change
Objective’s mission is to create software that makes a difference. Using Objective software, thousands of public sector organisations are shifting to being completely digital. Where our customers can work from anywhere; with access to information, governance guaranteed, and security assured. Innovation is our lifeblood. We invest significantly in the ongoing development of our products to deliver outstanding solutions to the public sector and regulated industries. The result – stronger national and community outcomes, and accountability that builds trust in government. Through the delivery of these projects, our services greatly reduce the number of physical documents (which end up as paper waste), whilst greatly improving the efficiencies of managing and processing comments from your consultation exercise – in turn allowing them to provide greater services to the public with the same or reduced amount of taxpayer funding. Objective Corporation UK Limited (Objective UK) is committed to achieving Net Zero emissions by 2050. A copy of our Carbon Reduction Plan can be viewed on our website.Equal opportunity
Equal opportunity
We recognise the value that different backgrounds, experiences and perspectives can bring to the business, and we oppose all forms of unlawful and unfair discrimination or victimisation. Objective’s Commitment: • To create an environment in which individual differences and the contributions of all our people are recognised and valued. • Selection for employment, promotion, training, or any other benefit will be based on aptitude and ability. • Every employee is entitled to a working environment that promotes dignity and respect. • Training, development, and progression is available to all employees. • To promote equality and diversity in the workplace. • To regularly review all our employment practices and procedures to ensure fairness. Diversity and Inclusion: We continuously strive to create a workplace that’s dynamic, diverse, and full of talent. A testament to this commitment was being certified as a Great Place to Work in 2023. We focus on purpose in everything we do, and offer our people continuous professional development, financial stability, flexibility, and an inclusive environment. Diversity, Equity and Inclusion (DEI): Our workforce reflects a diverse range of backgrounds, ensuring an inclusive and equitable environment. We are dedicated to fostering a culture that celebrates differences and promotes equal opportunities for all. DEI at Objective is not just a tick-box exercise, it’s a business imperative. We launched our 2023 DEI strategy to support further growth and creativity. Beyond this, we celebrate the diversity of our people through regular events during the year. Women Rising Programme: Launched in 2023, this is a holistic leadership and professional development programme. Open to all women, whether they are a manager or an individual contributor, it is designed to empower women and provide participants with the tools, knowledge, and inspiration so they can excel.
Pricing
- Price
- £9,244 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No