GATHER IT LIMITED
Gather
Gather provides a range of survey, audit and inspection services to collect and report all your data through our dedicated mobile and web apps.
Features
- Quick and easy data collection
- Using multiple data collection methods
- Such as mobile apps, online, phone, email and SMS
- Real time reporting through detailed, customisable dashboards
- In-depth analysis with SPC charts and AI reporting
- Reports can be exported into Word, Excel and Powerpoint
- Action planning and task management
Benefits
- Reduce the time and cost of data capture and reporting
- Provide instant detailed reports that are relevant for each user
- Action plans and outcomes are automatically created and monitored
Pricing
£1 a unit a day
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at hello@gatherit.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
2 7 2 6 4 6 3 0 9 3 6 0 8 0 8
Contact
GATHER IT LIMITED
Get in touch:
Telephone: 01212818020
Email: hello@gatherit.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- Our cloud service is accessible by any internet connected device.
- System requirements
- Internet connection
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Response times are based on the status of the ticket:
Critical - 30 minutes
Urgent - 4 hours
Normal - 3 business days
Information only - 3 business days - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Users can access our web chat via our online documentation pages or through our web application.
- Web chat accessibility testing
- We've ensured that the chat application meets key accessibility standards.
- Onsite support
- Onsite support
- Support levels
-
Basic support - online only
Advanced support - online, phone, webchat and SMS
Enhanced support - online, phone, webchat, SMS and on-site - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We provide onsite training for key staff at contract start
Online training, documentation and support are provided to all users
We provide built-in, guided step-by-step tutorials within the system - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Data can be extracted through the frontend or via API at any time.
We provide offboarding support at contract end if there are any additional needs. - End-of-contract process
- All service and support is included in the contract, and an additional month of support is provided at the end of the contract for any outstanding needs.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Approved users can interact with all services via API
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Users can customise the appearance and functionality of the service.
For example, you can set up a project, audit or survey
This can then be shared through multiple channels (private or public)
You can set customised triggers based on interaction with your project
You can create your own dashboard to monitor all aspects of the project
Scaling
- Independence of resources
- Our services are provided via a cluster of geographically separate systems with built-in redundancies.
Analytics
- Service usage metrics
- Yes
- Metrics types
- All usage of the application is provided via built-in dashboards
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- All data can be exported in multiple formats through the user interface.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLSX
- XML
- JSON
- DOCX
- PPTX
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XLSX
- XML
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- We have an uptime SLA, with over 9 years of zero downtime.
- Approach to resilience
- We provide geographically separate datacentres, with load balancers and redundancy to ensure we can handle peaks in demand and disaster recovery
- Outage reporting
- We have a public dashboard and would send email alerts/SMS to named contacts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Username or password
- Access restrictions in management interfaces and support channels
- We have user, team and role-based authorisation following their authentication
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We have named directors responsible for Information security, Disaster Recovery and GDPR policies, training and procedures.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We operate an agile development team that us test driven development to ensure all code, Dev Ops and security profiles are coordinated
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We conduct in-house penetration testing and monitor activity across our services to identify any potential threats or suspicious activity.
This is reviewed annually by an independent third party as part of a wider security audit. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Any potential compromises are identified by our security staff and underlying issues resolved as soon as possible. We are subscribed to alerts of any potential zero-day exploits in our software stack
Any such incidents fall under our Critical support, with action within an hour. - Incident management type
- Supplier-defined controls
- Incident management approach
-
We use an internal incident management system.
Users can raise incidents through our helpdesk support, and we conduct root cause analysis of any incident, with internal and external reports to those affected.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
Fighting climate change
We reduce our climate impact where possible, and fund tree planting initiatives in the UK and abroad to offset any carbon generation.Equal opportunity
We are an equal opportunity employer and tackle workplace inequality.
Pricing
- Price
- £1 a unit a day
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Our free trial includes full use of the service for up to 3 months.
We'll meet with you on-site to provide support.
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at hello@gatherit.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.