Skip to main content

Help us improve the Digital Marketplace - send your feedback

WR LOGIC LIMITED

Workforce and Rota Management for Public Sector

aTurnos is a cloud-based workforce management solution designed to optimise rota and schedule management in real time. Enhancing productivity across human resources, our platform supports the public sector by improving staff scheduling and team analysis, leading to increased job satisfaction and significant cost reductions.

Features

  • Manage diverse shift types for workforce optimisation.
  • Dynamic shift planning: Generate schedules based on staff needs.
  • Real-time schedule management: Modify schedules, monitor shift coverage.
  • Comprehensive employee profiles: Handle individual data, contracts, and specialities
  • Integrated absence management: Automatically adjust and manage absenteeism
  • Optimal staff allocation: by monitoring presence by shift and location.
  • Integrate smoothly with other systems through APIs, webhooks, and websockets.
  • Access reports for workforce metrics and shift analysis.
  • Manage operations on-the-go with web and mobile platform
  • Flexibly manage bonuses and compensations, free from traditional constraints.

Benefits

  • Cloud-based infrastructure: Quick setup for multi-user environments.
  • ISO27001 accredited - extensive security and access controls
  • User-friendly interface: No technical knowledge required; fast training processes.
  • New updates and versions included in the service fee.
  • Diverse clocking options: Supports Web, App, Biometric Systems, QR Reader
  • Solutions specifically for healthcare workforce management
  • Unlimited users - no costly licence fees
  • Cuts management time: Managers spend 70% less time scheduling tasks.
  • Streamlines holiday management and absences by 50%.
  • Recognised with multiple industry awards for innovation and efficiency.

Pricing

£1 to £6 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@wrlogic.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 3 2 1 8 9 2 8 4 7 1 2 3 2 5

Contact

WR LOGIC LIMITED Navneet Rojas
Telephone: 07414221313
Email: contact@wrlogic.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
No
System requirements
  • Latest versions of browsers
  • For mobile Android or iOS

User support

Email or online ticketing support
Email or online ticketing
Support response times
Applications’ support services (corrective maintenance level 3) for the support’s function to CLIENT:

Telephone support: Monday to Friday from 08:00 to 17:00

Ticketing support: Monitoring 24/5

Chat support: Monday to Friday from 08:00 to 17:00
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
For incidents rated as HIGH:
Essential disruption: Users are unable to perform their most critical business activities.
Resolution time:
30 minutes for immediate mitigation.
2 hours for substantial progress.
4 hours for complete resolution.

For incidents rated as MEDIUM:
Essential disruption: Users encounter difficulties or require significant solutions to perform essential company activities.
Resolution time:
Not applicable (N/A) for immediate resolution.
Not applicable (N/A) for substantial progress.
12 hours for complete resolution.

For incidents rated as LOW+:
Daily work disruption: Users experience disruption in daily work routines.
Resolution time:
Not applicable (N/A) for immediate resolution.
Not applicable (N/A) for substantial progress.
3 days for complete resolution.

For incidents rated as LOW-:
Minor disruptions: Users can perform essential business activities, but encounter minor disruptions.
Resolution time:
Not applicable (N/A) for immediate resolution.
Not applicable (N/A) for substantial progress.
7 days for complete resolution.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite/online training, user manual
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Data exports
End-of-contract process
The user has a cooling period and some time to extract their data

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
N/A
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Web interface and mobile app interface
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Keyboard Navigation Testing: We assess the interface's usability for users who rely on keyboard navigation instead of mouse input, ensuring that all interactive elements are accessible and operable via keyboard commands.
API
Yes
What users can and can't do using the API
Our service offers a robust API for seamless integration with external systems and applications. The API supports multiple authentication methods, including:

API Key and Secret: Users can authenticate API requests using an API key and secret combination, providing secure access to our service's functionality.
JWT Token: Alternatively, users can utilise JSON Web Tokens (JWT) for authentication, ensuring secure and stateless communication between their applications and our service.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Custom Logos: Users can personalize their interface by uploading their own logos, ensuring brand consistency and a professional appearance throughout the platform.
Custom Dictionary: We empower users to create and manage their custom dictionaries, allowing them to add industry-specific terminology, unique phrases, or frequently used words to enhance accuracy and relevance in their communications.
Custom Language (Locale): Our service supports customisation of language settings, enabling users to select their preferred language or locale. This feature ensures that users can interact with the platform in their native language, enhancing usability and accessibility across diverse user demographics.

Scaling

Independence of resources
We ensure that users are not impacted by fluctuations in demand from other users through our cloud auto-scaling system. This dynamic infrastructure automatically adjusts resource allocation based on current workload, ensuring consistent performance and responsiveness for all users, even during periods of high demand. By seamlessly scaling resources in real-time, we maintain optimal service levels and mitigate any potential impact on user experience, enabling uninterrupted access to our platform

Analytics

Service usage metrics
Yes
Metrics types
Health status
full audit with numbers around business operations
Reporting types
  • API access
  • Real-time dashboards

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
ATurnos.com

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
File export
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.90%
Approach to resilience
Our service is meticulously designed to ensure resilience and reliability, employing a multi-faceted approach:

Component Redundancy: We maintain a minimum of three instances of critical components at any given time, distributed across our infrastructure. This redundancy ensures high availability and fault tolerance, as any single instance failure is seamlessly handled by redundant components, preventing disruptions to service.
Replication Across Two Data Centres: To further enhance resilience, our service data is replicated across two geographically distinct data centres. This redundancy provides protection against localised outages or disasters, ensuring data integrity and continuity of service even in the event of a catastrophic failure at one data centre.
Outage reporting
Our service promptly reports any outages through a comprehensive system that includes:

Public Dashboard: We provide a real-time public dashboard that offers transparent visibility into the status of our service. Users can easily access this dashboard to monitor service health, view ongoing incidents, and track resolution progress.
Email Alerts: In addition to the public dashboard, our service automatically sends email alerts to notify users and stakeholders of any outages or service disruptions. These alerts include detailed information about the nature of the outage, its impact, and ongoing efforts to resolve the issue.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
We employ strict access control measures for management interfaces and support channels, granting access only to authorised personnel based on their roles. This includes multi-factor authentication, role-based access control, encryption, and IP-based restrictions. Regular audits ensure access is limited to necessary personnel.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
AENOR
ISO/IEC 27001 accreditation date
15/01/2024
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Security policy sets forth the guidelines and principles established by aTurnos to ensure the protection of information, compliance with defined security objectives, and the assurance of confidentiality, integrity, and availability of information systems. Additionally, it ensures compliance with all applicable legal obligations.

The director of aTurnos, recognising the importance of security in the workplace, assumes the following commitments regarding the Information Security Management System (ISMS):

Ensure that information security objectives are established and aligned with the company's strategies.
Integrate security requirements into organizational processes.
Provide necessary resources for the management system.
Communicate the importance of efficient security management and compliance with information security requirements.
Ensure that the information security management system achieves the expected results.
Lead and support individuals to contribute to the efficiency of the information security management system.
Promote continuous improvement of the management system.
Support appropriate roles to demonstrate leadership within their areas of responsibility.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
ATurnos is a Software as a Service (SaaS) solution. Each change or deployment is seamlessly executed without any disruption to users. Additionally, new features and bug resolutions are communicated to customers at least one month in advance.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The Security Command Center is Google Cloud's primary security and risk database. It offers an intuitive risk dashboard and analytics system for identifying and addressing security and data risks. In the Standard tier, Security Command Center includes Security Health Analytics, which provides managed vulnerability assessment scanning for Google Cloud assets, automatically detecting critical vulnerabilities and misconfigurations. Additionally, Web Security Scanner in the Standard tier supports custom scans of deployed applications with public URLs and IPs not behind a firewall.

Critical security patches are deployed immediately. High risk security patches are deployed within 1 day.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our protective monitoring processes incorporate Cloud Armor to safeguard against various threats. This tool blocks DDoS attacks and enforces predefined rules to mitigate SQL injection, XSS, and other attacks. Additionally, it allows us to define IP-based access controls for our services. We leverage Security Command Center for real-time security monitoring, utilising features like Event Threat Detection to identify threats like malware and brute force SSH attacks. Container Threat Detection is employed to detect container runtime attacks.

Security Health Analytics provides comprehensive monitoring and compliance reporting across Google Cloud assets, ensuring adherence to standards CIS, PCI DSS, NIST & ISO 27001.
Incident management type
Supplier-defined controls
Incident management approach
Dedicated Channels: Users can report incidents through multiple channels such as a dedicated email, or a ticketing system integrated into the organization’s IT service management (ITSM) platform.
Self-Service Portals: Organisations often provide a self-service portal where users can report incidents, track the status of their issues, and access FAQs and troubleshooting guides.
How Incident Reports are Provided:
-Incident Acknowledgment
-Ongoing Updates
-Post-mortem reports through email.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

We embrace a "work from anywhere" policy, promoting remote work among our employees to contribute to emission reduction efforts. Additionally, we have transitioned to a paperless approach, conducting all our processes digitally. This initiative not only reduces our impact on forests but also minimizes waste in landfills, conserves energy, and mitigates climate change impacts.

Equal opportunity

We're committed to nurturing an environment of equal opportunity for all our employees. Regardless of background, gender, nationality, culture, ethnicity, age, or differing abilities, we're focused on fostering a workplace culture where every individual feels valued and empowered. Ensuring gender parity and inclusion across all levels of our organisation is our foremost priority. We place special emphasis on elevating the representation of women leaders in key positions.

Wellbeing

Our commitment to employee well-being is evident through our partnership with Bupa, delivering a comprehensive health package. This includes private medical health cover, incentivised physical fitness programmes, and professional mental health services, including counselling and guidance. We place a strong emphasis on mental health awareness, enrolling employees in Mental Health First Aid courses and appointing dedicated Mental Health First Aiders. In our workplace, we foster an open, non-judgemental, and supportive atmosphere where every employee feels empowered to discuss mental and physical health concerns freely. To further promote mental well-being, we introduced a dedicated well-being benefit in 2022, allocating £50 per month to each employee for sport and headspace activities.

Pricing

Price
£1 to £6 a user a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at contact@wrlogic.com. Tell them what format you need. It will help if you say what assistive technology you use.