Safe Workplace - The Culture & Compliance Suite
World-leading culture & compliance platform. Reporting, case management, employee support, training, risk management, policies, mental health and more.
FREE ENGAGEMENT, DIVERSITY, PSYCHOLOGICAL SAFETY AND INCLUSION PULSE SURVEYS.
8x psychological safety. 50% less work. 6x early stage reporting. 70% would not have reported prior to SWP. 99% trust in anonymity.
Features
- Multi-channel reporting, 4 minute response time.
- Employee Relations Case Management
- Real-time response/chat to reports & concenrns
- Mental health reporting & case management
- Compliance training (inc reporting, EDI, BHD & culture)
- Training & full LMS
- Risk management
- Policy management
- Apps, portals and VOIP
- Reporting hotlines
Benefits
- 8x psychological safety (disproportionate positive impact in minority communities)
- 50% less case management workload
- 3x early stage reporting
- 99% trust in anonymity & reporting
- 70% of reporters 'would not have reported prior to SafeWorkplace"
- 400% increase in actionable intel
- 100% training compliance
- 99% conversion rate of support request/report to active conversation
- 400% increase in actionable intel
Pricing
£3 a user a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 6 0 0 3 1 2 8 5 3 1 7 8 3 9
Contact
SAFE SPACE TECHNOLOGY LTD
Luke Aikman
Telephone: 07775768532
Email: luke@safework.place
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- We can integrate with most HRIS software, as well as ActiveDirectory, etc.
- Cloud deployment model
- Hybrid cloud
- Service constraints
- NA
- System requirements
-
- Access to the internet
- Modern browsers & mobile devices
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Severity 1 - 1 hour response
Severity 2 - 2 hour response
Severity 3 - 8 hour response
Severity 1 - 12 hour response
Within workinng hours.
24/7 response can be provided at extra cost.
Triage response to employee report/support requests is within 15 minutes between 8am and 10pm 7 days a week. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- -
- Onsite support
- Yes, at extra cost
- Support levels
-
Culture and compliance workshops
Onboarding workshops
Training - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We run a series of 4 onboarding workshops and two training sessions. There is also a repository of online training constantly available.
Our technology team work with your IT team to integrate, if desired, the application with your ActiveDirectory or similar to enable automation of onboarding and offboarding of users.
Our team also work with you on a full communications plan, ensuring your staff are onboarded seamlessly.
We can also create bespoke trainings as well as help update codes of conduct, policies and anything else that's been on the 'to do list' for too long, - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
We will provide the data in CSVs or database dumps, as the client prefers.
We can also help transition to new suppliers if that's requested. - End-of-contract process
-
Within the price, we will decommission and provide data dumps.
Additional cost (per hour) will be any assistance of moving to a new supplier or the provision of data in prescribed formats.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Mobile is through iPhone and Android Apps.
The apps are fully featured for staff.
The admin apps are designed for triage and communication, whereas the admin web portal is designed for full case, report, risk and policy management. - Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
-
Yes - access is provided via our development team. We provide two-way integration on things like training record, employee conduct record, employee concerns, employee records, for onboarding and offboarding, and more.
NB endpoints are made available to clients on a request only basis, this is not 'generally available' - API documentation
- No
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Branding, workflows, training, user permissions, resources and much more.
The product is a 'platform' which we will customise for you during the onboarding process to suit your organisation's needs.
Scaling
- Independence of resources
- Infrastructure is elastic, based on Llambda functions and self-scaling resources.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
A full BI suite, included but not limited to:
- Reports made
- Support conversations initiated
- Response rate
- Breakdowns by incident type, location, etc
- Breakdowns by demographic (where desired, able and appropriate)
- Engagement and psychological safety statistics
- Mental health data
-... and much more. - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- A support request can be made which will be actioned by our team.
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
99.9%
Pro-rated refund. - Approach to resilience
- Confidential - available on request.
- Outage reporting
- Email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Access restrictions in management interfaces and support channels
- Role and group-based permissions are setup with the client in onboarding.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- ISOAccellerator
- ISO/IEC 27001 accreditation date
- December 2023
- What the ISO/IEC 27001 doesn’t cover
- Nothing we can think of.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
=== Information Security Policies and Processes ===
Our company diligently follows a comprehensive set of information security policies and processes to ensure the confidentiality, integrity, and availability of data. These encompass data classification, access controls, encryption, incident response, and disaster recovery.
==== Reporting Structure ====
The Chief Information Security Officer (CISO) directly reports to the Chief Executive Officer (CEO) and the Board of Directors, overseeing the entire security function.
==== Policy Enforcement and Adherence Assurance ====
We conduct regular audits and employ automated monitoring tools to ensure compliance. Non-compliance is addressed through disciplinary action, retraining, or process improvement initiatives. Furthermore, we conduct training, awareness programs, and simulated phishing exercises on a regular basis.
=== Regulatory Compliance ===
We maintain compliance with all relevant laws, regulations, and industry standards, including GDPR, Cyber Essentials, NIST, and ISO 27001, among others.
=== Continuous Improvement ====
Our commitment to continuous improvement is evidenced by feedback mechanisms in place to identify enhancement opportunities.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Tracking:
- inventory management
- Unique IDs
- Automated monitoring
- Version Control
Lifecycle reviews
Assessing changes for potential security impact:
- Change impact analysis
- Security testing
- Risk assessments
- Compliance verification
- Documents and communciation - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- To manage vulnerabilities, we conduct regular security assessments to identify potential threats. We promptly deploy patches by following a well-defined process based on the severity of the vulnerability. Information about potential threats is sourced from reputable sources such as security advisories, threat intelligence feeds, and vendor notifications. This proactive approach helps us stay ahead of emerging threats and ensures the security of our services.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
I. How to Identify Potential Compromises:
We use intrusion detection systems, log analysis, and network traffic monitoring to identify potential compromises.
II. How We Respond to Potential Compromises:
We immediately isolate affected systems, conduct forensic analysis, and escalate the issue to our incident response team.
III. Response Time:
Our goal is to respond to potential compromises within minutes, aiming for a swift and effective resolution. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Pre-defined processes: We have established pre-defined processes for common events to ensure prompt and effective resolution.
Incident reporting: Users report incidents through our dedicated support portal or by contacting their account manager directly.
Providing incident reports: We provide incident reports through email notifications, status updates on the support portal, and regular communication to the stakeholders involved.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
Safe Workplace highlights inequality in staffing, allowing proactive strategic response and training to ensure promotions internally proportionately at the expected levels across genders and communities.
We also highlight where mental health issues and misconduct are disproportionately impacting demographics, again allowing proactive action.Equal opportunity
No human should experience bullying, yet minority communities experience it 8 times as often and women more than twice as often as men.
Safe Workplace decreases bullying, discrimination and harassment and importantly increases psychological safety 8x.
We provide a safety net for employees that were previously scared to reach out for support when things were going wrong.Wellbeing
Safe Workplace has created the world's first mental health case management system.
We monitor wellbeing via pulse surveys but importantly provide inline anonymous support and advice where needed.
For organisations, this is increasingly important, also. The number of employee claims for stress and anxiety is increasing. Safe Workplace ensures any mumour of stress and anxiety is managed compliantly.
Pricing
- Price
- £3 a user a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
Engagement surveys to all staff and mini roll out to HR team.
30 days limit.