Visor Health & Safety Management System
Visor allows staff to report safety events and have the investigations of those events managed by the H&S team. The H&S team and other participants are proactively notified by the system as investigations proceed. Visor tracks follow-up actions to completion, enabling the team to prove what action was taken.
Features
- Implements your workflow for managing investigations
- Identifies user responsible for next action
- Proactive notification emails to users when tasks assigned
- Weekly reminder emails for open tasks
- Full audit trail
- Uses Windows user accounts for identity
- Power BI reporting dashboard
- Home Office returns produced by system
Benefits
- Enables H&S team to track progress of investigations and actions
- Automatic reminders for users and managers means less chasing
- Always clear which user made which changes to investigations
- Use of Windows user accounts means no forgotten passwords
- Reduces admin burden to H&S team
- Enables process improvement via KPI tracking
- Data quality improved by validation at point of entry
Pricing
£12,500 to £37,500 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 0 4 7 4 1 9 3 7 0 1 4 3 3 8
Contact
CUTTLEFISH SOFTWARE LTD
Nick Mace
Telephone: 07312082959
Email: nick@cuttlefishsoftware.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
-
- Users require their own Power BI licences
- Permissions in Microsoft Entra ID required
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Support is provided during business hours: 8am to 6pm, Monday to Friday, except bank holidays and public holidays.
Responses times are:
2 hours - where the system is inaccessible
4 hours - where operation of the system is severely degraded
12 hours - where non-essential features are impaired
24 hours - where errors are non-disabling or cosmetic - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Support
Cuttlefish Software accepts support tickets submitted to the online ticketing system 24 hours a day, seven days a week. We will use reasonable endeavours to process support requests, determine the source of the problem and respond to the customer. We will use reasonable endeavours to respond to all support requests within the time periods specified.
Availability
Cuttlefish Software shall provide at least a 99% uptime service availability level during business hours. The uptime service level is to be measured as the number of possible minutes of availability during business hours in each month. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Customisation of the system by Cuttlefish Software is included in the price for the system. We will organise a kick-off meeting (which can be in-person or remote, as per the preferences of the customer) to talk through how the implementation project will proceed. We will then conduct remote meetings on a weekly or fortnightly basis to discuss progress. Cuttlefish Software has recorded training videos to demonstrate how to use the Visor system.
- Service documentation
- Yes
- Documentation formats
- Other
- Other documentation formats
- Video
- End-of-contract data extraction
- The organisation can extract its data when the contract ends from the OData reporting endpoint.
- End-of-contract process
- Users can download their data from the OData endpoint for free. If users want the data to be provided in a different format, then this will be charged for. If users want the copies of the uploaded documents attached to cases, then this will be charged for.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- The system is a browser-based web application with a familiar look-and-feel. Users can see the tasks assigned to them and act on them. The H&S team can view the status of all tasks in progress and approve/reject work, as appropriate.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- None
- API
- No
- Customisation available
- Yes
- Description of customisation
- Cuttlefish software customises the investigation workflow on behalf on the customer. We do not charge for this services. It is included in the price.
Scaling
- Independence of resources
-
The application consists of a web application and a database.
The web application layer is shared across customers; the number of instances can be scaled up immediately if the service is affected by high load.
The databases share an Elastic Pool. Resource utlization is reviewed on an ad-hoc basis. The size of this pool can be scaled up immediately if the service is affected by high load.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Other
- Other data at rest protection approach
- Azure SQL Databases use transparent data encryption
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data is provided to users via Microsoft Power BI, from which data can be exported in multiple formats. Document attachments uploaded into the system can be re-downloaded by users.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XSLX
- Original format (document attachment download)
- Data import formats
- Other
- Other data import formats
- None
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Cuttlefish Software shall provide at least a 99% uptime service availability level during business hours. The uptime service level is to be measured as the number of possible minutes of availability during business hours in each month.
- Approach to resilience
- The system is delivered via Microsoft's Azure platform in the UK South data centre. Point-in-time backups are replicated to the UK West data centre. Document storage is also replicated to the UK West data centre. App service would be manually deployed to UK West if required.
- Outage reporting
-
System uptime is monitored using a health check API endpoint and Microsoft Azure standard uptime monitoring will alert us if a threshold of failures is breached.
Customers can monitor this endpoint themselves if they wish.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Identity federation with existing provider (for example Google Apps)
- Access restrictions in management interfaces and support channels
- The system comes with a fixed set of permissions. Users with the "user management" permission can define roles (a given set of permissions) and assign those roles to users.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Identity federation with existing provider (for example Google Apps)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We follow best practices including OWASP development practices, and NCSC guidance for approaching cyber security.
- Information security policies and processes
- We have a Security Handbook, and Sensitive Data Policy. The director in charge of security is responsible for ensuring all staff are familiar with all relevant policy documents, and comply with them.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Changes to configuration in Microsoft Azure is audited.
Development is routinely peer-reviewed and assessed for potential security impact.
Deployment is automated, removing human error and ensuring service resources are deployed consistently, to our expected standard. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Microsoft Azure platform services are routinely patched with security updates with no supplier action required.
We routinely review third-party software used in building our application. We use Nuget security warnings to decide which updates are required. We review JavaScript libraries manually.
Time to deploy depends on the level of vulnerability: we can immediately deploy patches if a critical vulnerability is detected. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
Microsoft Application Insights logs all activity within our application.
Changes to Azure infrastructure are logged.
We respond within 24 hours to any report of an incident. We would review all access logs available to us to determine whether suspicious activity had occurred. - Incident management type
- Supplier-defined controls
- Incident management approach
- All incidents are considered on a case-by-case basis. Users report incidents via our standard support system. We provide incident reports via our support system.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We do not have a physical office and therefore we do not need to use carbon-based energy for heating an office and providing electricity. As suppliers of cloud-based software, our main source of carbon emissions is in the data centres belonging to our cloud solutions partner. We chose Microsoft Azure because Microsoft has publicly committed to being carbon negative by 2030 and to have removed their historical carbon emissions by 2050.
Pricing
- Price
- £12,500 to £37,500 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No