Skip to main content

Help us improve the Digital Marketplace - send your feedback

On Device Solutions Ltd.

myJobCard

myJobCard is the highest-rated mobile work and asset management mobile application which integrates with SAP ECC and S/4 HANA on the SAP store (Rating verified G2). Within SAP ERP, myJobCard integrates with SAP Plant Maintenance (PM) and Customer Service (CS) modules to enable Mobile Asset Management for remote workers.

Features

  • Dynamic Form Engine
  • Supervisor View
  • Native UI for best Performance and UX
  • Maps & Enterprise GIS Integration.
  • Smartphone and Tablet/Desktop support
  • Offline Working

Benefits

  • Digitisation of Asset Management Process
  • Better Quality Data
  • Build your own data capture forms
  • Rapid Deployment
  • SAP mobile plant maintenance

Pricing

£10 to £100 a user a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at nsingla@ondevicesolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 4 1 2 5 1 7 5 2 6 2 5 7 0 4

Contact

On Device Solutions Ltd. Navdeep Singla
Telephone: 01217692048
Email: nsingla@ondevicesolutions.com

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
SAP Plant Maintenance module
SAP Enterprise Asset Management (EAM) Module
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
No
System requirements
  • SAP ECC 6.0 EHP2
  • SAP S/4 HANA

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 2 hours.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
No
Web chat support
No
Onsite support
Onsite support
Support levels
Basic SLA is included in the product support.
Enhanced SLA are available for an additional 20% fee.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Through an onboarding process.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Data is stored in user's SAP system.
End-of-contract process
Removal of the software from customer system is not included.

Using the service

Web browser interface
No
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Runs on Mobile phone, tablet and Windows Desktop.
Service interface
No
User support accessibility
WCAG 2.1 A
API
No
Customisation available
Yes
Description of customisation
Through their internal terms, our consulting or 3rd party consulting partners.

Scaling

Independence of resources
Scalable underlying PaaS.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data is user's SAP system.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.9%
Approach to resilience
Underlying PaaS is resilient. Works offline.
Outage reporting
Email Alerts.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels
Roles based access controls.
Access restriction testing frequency
Less than once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Approachable
ISO/IEC 27001 accreditation date
02/09/2023
What the ISO/IEC 27001 doesn’t cover
Everything is covered.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO 27001

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We follow an ISO change management process.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerability control based on ISO 27001
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
ISO 27001
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
ISO 27001

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

We have company EV scheme where employees have participated with enthusiasam.

Pricing

Price
£10 to £100 a user a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 days assisted trial on qualification.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at nsingla@ondevicesolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.