Skip to main content

Help us improve the Digital Marketplace - send your feedback

GATHER IT LIMITED

Gather

Gather provides a range of survey, audit and inspection services to collect and report all your data through our dedicated mobile and web apps.

Features

  • Quick and easy data collection
  • Using multiple data collection methods
  • Such as mobile apps, online, phone, email and SMS
  • Real time reporting through detailed, customisable dashboards
  • In-depth analysis with SPC charts and AI reporting
  • Reports can be exported into Word, Excel and Powerpoint
  • Action planning and task management

Benefits

  • Reduce the time and cost of data capture and reporting
  • Provide instant detailed reports that are relevant for each user
  • Action plans and outcomes are automatically created and monitored

Pricing

£1 a unit a day

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hello@gatherit.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 7 2 6 4 6 3 0 9 3 6 0 8 0 8

Contact

GATHER IT LIMITED Get in touch:
Telephone: 01212818020
Email: hello@gatherit.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
Our cloud service is accessible by any internet connected device.
System requirements
Internet connection

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are based on the status of the ticket:

Critical - 30 minutes
Urgent - 4 hours
Normal - 3 business days
Information only - 3 business days
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Users can access our web chat via our online documentation pages or through our web application.
Web chat accessibility testing
We've ensured that the chat application meets key accessibility standards.
Onsite support
Onsite support
Support levels
Basic support - online only
Advanced support - online, phone, webchat and SMS
Enhanced support - online, phone, webchat, SMS and on-site
Support available to third parties
No

Onboarding and offboarding

Getting started
We provide onsite training for key staff at contract start
Online training, documentation and support are provided to all users
We provide built-in, guided step-by-step tutorials within the system
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data can be extracted through the frontend or via API at any time.
We provide offboarding support at contract end if there are any additional needs.
End-of-contract process
All service and support is included in the contract, and an additional month of support is provided at the end of the contract for any outstanding needs.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Approved users can interact with all services via API
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Users can customise the appearance and functionality of the service.
For example, you can set up a project, audit or survey
This can then be shared through multiple channels (private or public)
You can set customised triggers based on interaction with your project
You can create your own dashboard to monitor all aspects of the project

Scaling

Independence of resources
Our services are provided via a cluster of geographically separate systems with built-in redundancies.

Analytics

Service usage metrics
Yes
Metrics types
All usage of the application is provided via built-in dashboards
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
All data can be exported in multiple formats through the user interface.
Data export formats
  • CSV
  • Other
Other data export formats
  • XLSX
  • XML
  • JSON
  • DOCX
  • PPTX
Data import formats
  • CSV
  • Other
Other data import formats
  • XLSX
  • XML
  • JSON

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We have an uptime SLA, with over 9 years of zero downtime.
Approach to resilience
We provide geographically separate datacentres, with load balancers and redundancy to ensure we can handle peaks in demand and disaster recovery
Outage reporting
We have a public dashboard and would send email alerts/SMS to named contacts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Username or password
Access restrictions in management interfaces and support channels
We have user, team and role-based authorisation following their authentication
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have named directors responsible for Information security, Disaster Recovery and GDPR policies, training and procedures.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We operate an agile development team that us test driven development to ensure all code, Dev Ops and security profiles are coordinated
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We conduct in-house penetration testing and monitor activity across our services to identify any potential threats or suspicious activity.
This is reviewed annually by an independent third party as part of a wider security audit.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Any potential compromises are identified by our security staff and underlying issues resolved as soon as possible. We are subscribed to alerts of any potential zero-day exploits in our software stack
Any such incidents fall under our Critical support, with action within an hour.
Incident management type
Supplier-defined controls
Incident management approach
We use an internal incident management system.
Users can raise incidents through our helpdesk support, and we conduct root cause analysis of any incident, with internal and external reports to those affected.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity

Fighting climate change

We reduce our climate impact where possible, and fund tree planting initiatives in the UK and abroad to offset any carbon generation.

Equal opportunity

We are an equal opportunity employer and tackle workplace inequality.

Pricing

Price
£1 a unit a day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Our free trial includes full use of the service for up to 3 months.
We'll meet with you on-site to provide support.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at hello@gatherit.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.