Workforce and Rota Management for Public Sector
aTurnos is a cloud-based workforce management solution designed to optimise rota and schedule management in real time. Enhancing productivity across human resources, our platform supports the public sector by improving staff scheduling and team analysis, leading to increased job satisfaction and significant cost reductions.
Features
- Manage diverse shift types for workforce optimisation.
- Dynamic shift planning: Generate schedules based on staff needs.
- Real-time schedule management: Modify schedules, monitor shift coverage.
- Comprehensive employee profiles: Handle individual data, contracts, and specialities
- Integrated absence management: Automatically adjust and manage absenteeism
- Optimal staff allocation: by monitoring presence by shift and location.
- Integrate smoothly with other systems through APIs, webhooks, and websockets.
- Access reports for workforce metrics and shift analysis.
- Manage operations on-the-go with web and mobile platform
- Flexibly manage bonuses and compensations, free from traditional constraints.
Benefits
- Cloud-based infrastructure: Quick setup for multi-user environments.
- ISO27001 accredited - extensive security and access controls
- User-friendly interface: No technical knowledge required; fast training processes.
- New updates and versions included in the service fee.
- Diverse clocking options: Supports Web, App, Biometric Systems, QR Reader
- Solutions specifically for healthcare workforce management
- Unlimited users - no costly licence fees
- Cuts management time: Managers spend 70% less time scheduling tasks.
- Streamlines holiday management and absences by 50%.
- Recognised with multiple industry awards for innovation and efficiency.
Pricing
£1 to £6 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 3 2 1 8 9 2 8 4 7 1 2 3 2 5
Contact
WR LOGIC LIMITED
Navneet Rojas
Telephone: 07414221313
Email: contact@wrlogic.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
-
- Latest versions of browsers
- For mobile Android or iOS
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Applications’ support services (corrective maintenance level 3) for the support’s function to CLIENT:
Telephone support: Monday to Friday from 08:00 to 17:00
Ticketing support: Monitoring 24/5
Chat support: Monday to Friday from 08:00 to 17:00 - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
For incidents rated as HIGH:
Essential disruption: Users are unable to perform their most critical business activities.
Resolution time:
30 minutes for immediate mitigation.
2 hours for substantial progress.
4 hours for complete resolution.
For incidents rated as MEDIUM:
Essential disruption: Users encounter difficulties or require significant solutions to perform essential company activities.
Resolution time:
Not applicable (N/A) for immediate resolution.
Not applicable (N/A) for substantial progress.
12 hours for complete resolution.
For incidents rated as LOW+:
Daily work disruption: Users experience disruption in daily work routines.
Resolution time:
Not applicable (N/A) for immediate resolution.
Not applicable (N/A) for substantial progress.
3 days for complete resolution.
For incidents rated as LOW-:
Minor disruptions: Users can perform essential business activities, but encounter minor disruptions.
Resolution time:
Not applicable (N/A) for immediate resolution.
Not applicable (N/A) for substantial progress.
7 days for complete resolution. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite/online training, user manual
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Data exports
- End-of-contract process
- The user has a cooling period and some time to extract their data
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- N/A
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Web interface and mobile app interface
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Keyboard Navigation Testing: We assess the interface's usability for users who rely on keyboard navigation instead of mouse input, ensuring that all interactive elements are accessible and operable via keyboard commands.
- API
- Yes
- What users can and can't do using the API
-
Our service offers a robust API for seamless integration with external systems and applications. The API supports multiple authentication methods, including:
API Key and Secret: Users can authenticate API requests using an API key and secret combination, providing secure access to our service's functionality.
JWT Token: Alternatively, users can utilise JSON Web Tokens (JWT) for authentication, ensuring secure and stateless communication between their applications and our service. - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Custom Logos: Users can personalize their interface by uploading their own logos, ensuring brand consistency and a professional appearance throughout the platform.
Custom Dictionary: We empower users to create and manage their custom dictionaries, allowing them to add industry-specific terminology, unique phrases, or frequently used words to enhance accuracy and relevance in their communications.
Custom Language (Locale): Our service supports customisation of language settings, enabling users to select their preferred language or locale. This feature ensures that users can interact with the platform in their native language, enhancing usability and accessibility across diverse user demographics.
Scaling
- Independence of resources
- We ensure that users are not impacted by fluctuations in demand from other users through our cloud auto-scaling system. This dynamic infrastructure automatically adjusts resource allocation based on current workload, ensuring consistent performance and responsiveness for all users, even during periods of high demand. By seamlessly scaling resources in real-time, we maintain optimal service levels and mitigate any potential impact on user experience, enabling uninterrupted access to our platform
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Health status
full audit with numbers around business operations - Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- ATurnos.com
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- File export
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.90%
- Approach to resilience
-
Our service is meticulously designed to ensure resilience and reliability, employing a multi-faceted approach:
Component Redundancy: We maintain a minimum of three instances of critical components at any given time, distributed across our infrastructure. This redundancy ensures high availability and fault tolerance, as any single instance failure is seamlessly handled by redundant components, preventing disruptions to service.
Replication Across Two Data Centres: To further enhance resilience, our service data is replicated across two geographically distinct data centres. This redundancy provides protection against localised outages or disasters, ensuring data integrity and continuity of service even in the event of a catastrophic failure at one data centre. - Outage reporting
-
Our service promptly reports any outages through a comprehensive system that includes:
Public Dashboard: We provide a real-time public dashboard that offers transparent visibility into the status of our service. Users can easily access this dashboard to monitor service health, view ongoing incidents, and track resolution progress.
Email Alerts: In addition to the public dashboard, our service automatically sends email alerts to notify users and stakeholders of any outages or service disruptions. These alerts include detailed information about the nature of the outage, its impact, and ongoing efforts to resolve the issue.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- We employ strict access control measures for management interfaces and support channels, granting access only to authorised personnel based on their roles. This includes multi-factor authentication, role-based access control, encryption, and IP-based restrictions. Regular audits ensure access is limited to necessary personnel.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- AENOR
- ISO/IEC 27001 accreditation date
- 15/01/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Security policy sets forth the guidelines and principles established by aTurnos to ensure the protection of information, compliance with defined security objectives, and the assurance of confidentiality, integrity, and availability of information systems. Additionally, it ensures compliance with all applicable legal obligations.
The director of aTurnos, recognising the importance of security in the workplace, assumes the following commitments regarding the Information Security Management System (ISMS):
Ensure that information security objectives are established and aligned with the company's strategies.
Integrate security requirements into organizational processes.
Provide necessary resources for the management system.
Communicate the importance of efficient security management and compliance with information security requirements.
Ensure that the information security management system achieves the expected results.
Lead and support individuals to contribute to the efficiency of the information security management system.
Promote continuous improvement of the management system.
Support appropriate roles to demonstrate leadership within their areas of responsibility.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- ATurnos is a Software as a Service (SaaS) solution. Each change or deployment is seamlessly executed without any disruption to users. Additionally, new features and bug resolutions are communicated to customers at least one month in advance.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
The Security Command Center is Google Cloud's primary security and risk database. It offers an intuitive risk dashboard and analytics system for identifying and addressing security and data risks. In the Standard tier, Security Command Center includes Security Health Analytics, which provides managed vulnerability assessment scanning for Google Cloud assets, automatically detecting critical vulnerabilities and misconfigurations. Additionally, Web Security Scanner in the Standard tier supports custom scans of deployed applications with public URLs and IPs not behind a firewall.
Critical security patches are deployed immediately. High risk security patches are deployed within 1 day. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Our protective monitoring processes incorporate Cloud Armor to safeguard against various threats. This tool blocks DDoS attacks and enforces predefined rules to mitigate SQL injection, XSS, and other attacks. Additionally, it allows us to define IP-based access controls for our services. We leverage Security Command Center for real-time security monitoring, utilising features like Event Threat Detection to identify threats like malware and brute force SSH attacks. Container Threat Detection is employed to detect container runtime attacks.
Security Health Analytics provides comprehensive monitoring and compliance reporting across Google Cloud assets, ensuring adherence to standards CIS, PCI DSS, NIST & ISO 27001. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Dedicated Channels: Users can report incidents through multiple channels such as a dedicated email, or a ticketing system integrated into the organization’s IT service management (ITSM) platform.
Self-Service Portals: Organisations often provide a self-service portal where users can report incidents, track the status of their issues, and access FAQs and troubleshooting guides.
How Incident Reports are Provided:
-Incident Acknowledgment
-Ongoing Updates
-Post-mortem reports through email.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
We embrace a "work from anywhere" policy, promoting remote work among our employees to contribute to emission reduction efforts. Additionally, we have transitioned to a paperless approach, conducting all our processes digitally. This initiative not only reduces our impact on forests but also minimizes waste in landfills, conserves energy, and mitigates climate change impacts.Equal opportunity
We're committed to nurturing an environment of equal opportunity for all our employees. Regardless of background, gender, nationality, culture, ethnicity, age, or differing abilities, we're focused on fostering a workplace culture where every individual feels valued and empowered. Ensuring gender parity and inclusion across all levels of our organisation is our foremost priority. We place special emphasis on elevating the representation of women leaders in key positions.Wellbeing
Our commitment to employee well-being is evident through our partnership with Bupa, delivering a comprehensive health package. This includes private medical health cover, incentivised physical fitness programmes, and professional mental health services, including counselling and guidance. We place a strong emphasis on mental health awareness, enrolling employees in Mental Health First Aid courses and appointing dedicated Mental Health First Aiders. In our workplace, we foster an open, non-judgemental, and supportive atmosphere where every employee feels empowered to discuss mental and physical health concerns freely. To further promote mental well-being, we introduced a dedicated well-being benefit in 2022, allocating £50 per month to each employee for sport and headspace activities.
Pricing
- Price
- £1 to £6 a user a month
- Discount for educational organisations
- No
- Free trial available
- No