Patient Contact/Contact4Business
RPM’s ‘Contact’ provides cloud telephony functionality and technology with extensive and fully manageable features which give you complete control over your communications estate, whether you’re a single or multi-site environment with handset, mobile or desktop users.
Features
- Access to online portal and complete system awareness
- Choice of softphones, desktop phones or mobile users
- Applications - Integrated screen-pop, voicemail and cloud fax services
- Call queuing, opt out and auto call back
- Estimated wait time and call queue position
- Real-time call centre analysis
- Call recording - all calls or on demand, stored on-line
- Disaster recovery and call guard fraud protection
- Voicemail-to-email, fax-to-email or email-to-fax (cloud mail)
- Language translation services
Benefits
- Ability to take calls on any device, anywhere
- Call recording access for dispute resolution and training
- Data security and fraud detection and prevention facilities
- Reduce abandoned calls
- Take steps toward a paperless environment and reduce carbon footprint
- Disaster recovery and operational continuity
- Inclusive maintenance within monthly rentals
- 24/7 access to online portal to make configuration changes
- 24/7 access to RPM support team
- Free of charge calls to UK local/national/mobile destinations
Pricing
£24.00 a user a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 1 4 9 2 9 1 0 8 3 8 7 9 6 5
Contact
RPM Business Communications Ltd
James Lupson
Telephone: 0333 6006 999
Email: info@rpmsols.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Non essential portal access may be limited out of hours due to planned maintenance.
- System requirements
-
- Dedicated or compatible IP network required
- Minimum bandwidth requirement of 100Kbps per user
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 1-5 working days, depending on the priority of the query.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
RPM provide a dedicated service response centre staffed by qualified personnel. Our aim is to provide a prompt, positive and professional response to your call or email if you require technical advice or should your cloud system develop a fault. First line support is available via email or over the phone 24/7/365. For any major faults or system failures RPM aims to respond within 1 working hour. We regularly inform the status of a raised support query and provide a support ticket reference. Any updates to this support reference are emailed to the specified contact.
We provide Service Desk and Account Management Teams. Support engineers answer the phones in the RPM Service Desk and perform first stage fault analysis. If they are unable to resolve the incident will be escalated to Tier 2 and Tier 3 technical support engineers. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
On-site training is fully inclusive within the system purchase cost and is usually provided by the RPM engineers installing the solution. Additional remote training can also be provided. User guides are provided.
General queries and guidance can be directed to our operations and support teams.
A named account manager will also be assigned to your account to support you and provide responses on any questions in the first instance. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Our online admin portal is a secure online space giving customers complete visibility of the assets that we manage for them. This information can be easily downloaded for extraction into excel. Our monthly ebill information which is sent out to the customer via email also includes a breakdown of the communications estate in a PDF format.
- End-of-contract process
-
Unless the customer provides notice according to the terms and conditions then there contract will continue all services.
All hardware is included within the price of the contract. This can include, but is not limited to, handsets, headsets, expansion modules, PCs, monitors, PC peripherals, PoE switches, Cat5e cabling/sundries and routers where applicable. Software licenses for the use of the cloud platform are non-transferable. Routers supplied by RPM for dedicated network services are not included within the price of the contract and we expect these to be returned at the expense of the customer.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
We provide a bolt on App which can be added as an option.
The mobile soft client app allows a user to make and receive calls on a mobile device, as well as accessing key settings for their service. It provides all the same functionality as the desktop soft client. - Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- Customers can inform us of any CRM or other types of database which they would like to interact with the cloud software. This could include the integration and 'screen-popping' of customer information as they call into the system, which then appears on the end users desktop. We also allow the implementation of some automated download services for call recordings, as well as development on updates to cloud storage services for call recording back-ups.
- API documentation
- No
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Users have the ability to move 'widgets' around on the home screen in an order which suits them best. Users have full control over call flow features and schedules. This means at any time of the day they can program a change to the system and adapt where incoming calls are answered. These schedules are programmed to activate automatically, which means pre-defined events (such as training dates, bank holidays, lunch modes etc.) can all be scheduled in advance. Voicemail, voicemail-to-email and auto-attendant messages can be altered. User presentation ID can be changed, which can be a user ID, the site main number or withheld completely.
Administrators have access to the full feature set of the platform, including the statistics and call recording sections. Each application user can also be given access to their own portal which offers completely separate widgets based around individual statistics, call history and login/logout features for call groups.
Scaling
- Independence of resources
- Management of our SLA's are in accordance with customer numbers and staffing numbers. Staff headcount and resource are kept to levels which outweigh customer demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- The standard system comes with historical call statistics 'out-of-the-box' which is accessible for up to the previous 12 months. This highlights the number of inbound/outbound calls, and can be filtered by specific hunt groups, users or sites. For an advanced call reporting 'call centre' experience, an additional comprehensive call centre package is available. This integrated software (also cloud-based, accessed via web pages) offers granular detail on call flow and user activity, as well as real-time wallboards, reporting and agent status if required.
- Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- BT OpenReach
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- A number of the feature pages within the platform have blue 'export' icons which allow you to download a list of the data relevant to that page. This could include user info, hardware info or call statistics and recordings.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
Service Availability and other measures with the SLA relate to the core service and does not include access or local CPE elements.
If a Service is partially available then the Unplanned Downtime shall be calculated in equal proportion i.e. if a service is 50% available then the unplanned downtime will be calculated as: [50% x elapsed period of the incident]. Availability Measurement Period: 3 Calendar months.
User subscriptions will be available 99.95% of the time.
Graphical User Interface (GUI) will be available to end customers 99.9% of the time.
Auto-Attendant, Call Recording and Unified Messaging subscriptions will be available 99.0% of the time.
Not included:
- Outages which are deemed by us to be the result of matters outside of direct control
- Planned or emergency maintenance
- User error
Notes: Core functions are part of the Switching infrastructure, transmission equipment and core network, the service that supports call routing and termination.
Non-Core functions include the network Support Systems, access to any relevant portals and feature based services such as Call Plans, Call diverts, Auto Attendant and Call Recording
PESQ score target for G711 is 4.1 and G729 is 3.7 - Approach to resilience
- Core service is hosted across 2 data centres based in London and Manchester. Data is replicated between the two to protect against loss of information or service disruption. The underlying core network is based on BT Openreach fibre connectivity with both 'business care' level added to the IP connection and 'care level 4' on the circuit, which is the highest level of response for faults. Cloud-based services are accessible by our support department 24/7 and therefore calls can be routed to disaster recovery locations in the event of a fault or unforeseen circumstance. This provides reassurance with complete operational continuity options available round-the-clock. With leased line connectivity RPM can also implement a backup service.
- Outage reporting
-
For major service outages to the core network RPM can contact the affected customer's via email. Updates on the severity and estimated fix time can also be directed to the point of contact for each affected site. We
also utilise our social media presence to highlight any issues which may have occurred at a national level.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access to our platform is typically provided on a secure and dedicated network with firewall restriction and QoS-enabled routers. End user access to the features and underlying software is protected via username and password credentials via a secure web interface.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Lloyd's Register Quality Assurance Ltd
- ISO/IEC 27001 accreditation date
- 29/04/17
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- No
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
The underlying network and infrastructure operators have deployed an Information Security Management System Manual (ISMS) which meets and is certified to ISO 27001:2013. It is supported by numerous policies and processes including but not limited to the following:
Information Security Policy
Information Security Incident Policy
Acceptable use policy
Access Control Procedure
Backup Plan
Business Continuity Plan
Confidential Data Policy
Data Protection Policy
The Reporting structure is from employees or customers to the Information Security Manager to the Information security Forum which is attended by several Directors and heads of departments. The Information Security Forum meets monthly to review all security incidents and events and corrective actions are agreed and tracked at this forum.
To raise awareness there is also access to a computer-based training platform for Security Awareness which is repeated annually. Line Managers have a responsibility to ensure their staff are aware of and follow these policies.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Change Control Process covers changes made to operational systems, to mitigate the risks and impacts that any change has and ensures good communication at all stages.
Change Management ensures changes to core infrastructure and services are performed and implemented correctly.
Best practice guidance, aligned to ITIL (OGC), recommends that the starting point for any change should be a review of generic questions or the ‘seven Rs’.
A risk and impact assessment is carried out for each change this involves detailing the assets under change.
The Change Advisory Board (CAB) has a representative from each impacted business area. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Our network utilise failure mode effects analysis process, conducting regular, systematic assessments of vulnerabilities to determine the necessity of safeguards, countermeasures and controls, monitoring for changes to maintain an acceptable level of risk. Includes identifying key information assets and subjecting them to specific risk assessments, assessing exposure to a list of common threats and vulnerabilities, maintaining risk registers, implementing technical, policy, business continuity and management initiatives;
Each patch is assessed and deployed accordingly:
High - Urgently.
Medium - ASAP.
Low - time permitting.
Our network utilise many Vendor sources and industry RSS feeds, CERT, Ubuntu and Debian. Member of CiSP. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Our network utilise GPG 13 guidance. There is a pre-built Security Information & Event Management Solution (SIEM) to identify potential compromises. If a compromise is found it is investigated. A Security Incident is raised to track the investigation, root cause and solutions if required to rectify or improve the situation. There is a response to incidents as close to real time as practicable.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our network operate an Incident Management process which has numerous pre-defined sub groups of staff designated for particular products or scenarios. It can be initiated by any member of staff and is managed by the 24/7 Network Operations Centre (NOC). Any incident is reported by the customer to the Service Desk, it is recorded in a customer relationship management tool (CRM) and an Incident report is produced after root cause analysis has taken place. Any Incident reports are made available to end users via pdf.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
LED office lighting throughout nationwide offices. Electric vehicle swap overs since March 2022 where possible. - Tackling economic inequality
-
Tackling economic inequality
Reduced working hours for all staff and introduced annual automatic salary increases. - Equal opportunity
-
Equal opportunity
We are committed to equal opportunity and diversity. - Wellbeing
-
Wellbeing
Reduced working hours for all staff and introduced annual automatic salary increases.
Pricing
- Price
- £24.00 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- No