Causeway Technologies Limited

GencardaSuite

Gencarda Suite delivers up-to-date and trusted authentication of individuals’ credentials (qualifications, licences, certificates and memberships).

It is the chosen solution for a wide range of organisations looking for a sustainable, digital system to:
Reduce credential fraud
Engage with their membership/ community effectively and
Manage records in one powerful online system.

Features

  • Quick and easy to set up. Sustainable .
  • A scalable, fully hosted, secure online solution.
  • High-security virtual or physical smartcards can be used.
  • Each individual’s cards can hold multiple credentials.
  • Cards can be updated, cancelled, suspended and reactivated electronically.
  • Free apps for authenticating virtual/ physical smartcards and individual credentials.
  • A range of data can be managed quickly using templates.
  • API available for importing and exporting member/ individual data.
  • Effective and simple reporting at your fingertips.
  • Messaging module for effective and instant communication with cardholders

Benefits

  • Suitable for a very wide range of organisations.
  • Provides a powerful communications conduit to cardholders
  • A dashboard provides key management information at a glance
  • Card renewals are easy to identify and manage
  • Information stored on cards is up to date and available
  • Cards can be authenticated offline as well as online
  • Virtual smartcards can be downloaded instantly.
  • Sustainability. Virtual smartcards eliminate need to use plastic stock.
  • Full card data is captured when cards are checked.
  • Electronic card checks eliminate fake cards, cut fraud/ protect communities

Pricing

£10,000.00 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tanya.morris@causeway.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

2 7 3 4 7 2 3 7 6 8 0 9 1 9 1

Contact

Causeway Technologies Limited Tanya Morris
Telephone: 01753 279927
Email: tanya.morris@causeway.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
No formal constraints. Occasional system maintenance is managed through scheduled downtime, which is always communicated to clients in advance.
System requirements
  • A device with internet access and a current web browser
  • Modern browser versions: MS Edge; Google Chrome; Apple Safari.
  • Internet Connectivity
  • (Optional) Checarda Android App: v6+. Rear-facing camera. NFC
  • (Optional) Checarda iOS App: iOS 12+. Rear-facing camera. NFC

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Gencarda Database to Scheme administrators: Normal working hours Monday - Friday (09.00-17.00) only.
Response time varies depending on priority.

End users (i.e. cardholders) are supported by the Client organisation, not by Reference Point.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
Service Availability: The standard GencardaSuite price includes hosted service availability (24/7 ) other than minimal scheduled downtime (for maintenance or updates), which is always communicated in advance.

Our Cloud service is monitored at all times to ensure full availability.
User Support to named, trained scheme administrators only during standard UK office hours (9am to 5pm Monday-Friday).
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Training to Scheme Administrators as well as consultancy are offered as options within the Initial Set-up array for further charges.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
The data remains the property of the data controller throughout the entirely of the contract/ service delivery and beyond contract end (and to be clear the client is Data Controller, NOT Reference Point). In line with the above, at the end of the contract, the full data-set will be provided to the client securely as a set of encrypted relational data tables in CSV or other agreed format.
End-of-contract process
The standard End of Contract process is as follows. The Client shall settle any valid outstanding invoices for use of the Software and for the Services provided prior to termination. Within ten (10) Business Days Reference Point will supply the Client with a series of encrypted relational data-files containing any and all Client data held and shall securely dispose of any copies of the data held in the service immediately thereafter. The above service is included for a standard end of contract fee.

If the Client requires any additional services, these are available but would be additionally chargeable (such as requiring RPL to retain copies for more than 15 days after contract end or provide any further consultancy around end of contract processes).

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
In addition to the main online Gencarda database (accessed via a web browser), users can install the Checarda App (Android and iOS versions available), which enables people simply to check smartcards (physical or virtual) and the credentials on them.
Virtual smartcards can be downloaded to our electronic wallet called Vircarda (Android and iOS versions available).
Service interface
Yes
User support accessibility
WCAG 2.1 A
Description of service interface
Once logged in to the browser-based admin interface, the service user is presented with a clear and concise overview of the current service status. This then leads the user into a series of intuitive screens to represent the key application workflows driving the management of scheme members, the issuance of smartcards and the ongoing administration of credentials, such as qualifications, licences, certificates and identity documents.
Accessibility standards
WCAG 2.1 A
Accessibility testing
In-house development and testing.
API
Yes
What users can and can't do using the API
The API facilitates programmatic execution of all the key tasks otherwise performed via the browser-based admin interface, with the exception of system configuration, user management and reporting.
API consumers are issued with an API key that restricts the scope of their interaction via the API to a given subset of the application model. Support and guidance is offered throughout the implementation of the API by way of developer training and usage samples.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
Gencarda is hosted on the Microsoft Azure cloud platform and so benefits from the security tools, scalability and controls this provides. Run on a responsive, tiered platform, the system has been implemented to utilise the scalability, performance and resilience benefits offered by the MS Azure cloud. This includes the capability to be scaled horizontally and vertically to meet the demands of very large numbers of concurrent users and high volumes of transactions, with rapid escalation when demand/ usage peaks.

Analytics

Service usage metrics
Yes
Metrics types
Gencarda's reporting module provides a suite of pre-built reports and the ability to define custom reports to meet specific client requirements. Once executed, the results can be exported to Excel or CSV.
In addition, server-level metrics can be provided from the functions provided by the Azure platform for a further fee.
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Gencarda's reporting module provides a suite of pre-built reports which are also added to from time to time.

We also have the ability to define custom reports to meet specific client requirements and make these available on the system too (additional report creation charges may apply – depending on the content required). Once executed, any report results can be exported to Excel or CSV.
Data export formats
CSV
Data import formats
  • CSV
  • Other
Other data import formats
If using API, JSON or XML

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The software is hosted and available over the internet on the Microsoft Azure platform 24 hours a day, 365/6 days a year with uptime (excluding planned downtime for scheduled maintenance or updates) of 99.5%. Run on a responsive, tiered platform, the system has been implemented to utilise the scalability, performance and resilience benefits offered by the MS Azure cloud.

This includes the capability to be scaled horizontally and vertically to meet the demands of very large numbers of concurrent users and high volumes of transactions, with rapid escalation when demand/ usage peaks.

Further details available on request.

The service is hosted in Azure data centres with geo-redundant back-ups.

The standard service is provisioned on MS Azure to ensure high availability through automated health monitoring and management services that the platform provides. As such, service resources are configured across multiple fault domains to guarantee the service will operate reliably in the event of an underlying hardware or infrastructure failure with a resilience ratio greater than N+1.

Further details are available on request.
Approach to resilience
The service is hosted in UK Azure data centres with geo-redundant back-ups. The standard service is provisioned on MS Azure to ensure high availability through automated health monitoring and management services that the platform provides. As such, service resources are configured across multiple fault domains to guarantee the service will operate reliably in the event of an underlying hardware or infrastructure failure with a resilience ratio greater than N+1.

Further details are available on request.
Outage reporting
The service is fully and continually monitored with all notifiable failures immediately escalated to the technical service delivery team. Where necessary, outages are communicated to users via email alerts.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
The browser-based Administrator interface is governed by role-based authorisation within an allocated subset of the application data model, with roles ranging from application-wide system administrators to scheme-specific managers and administrators.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
QMS International Limited
ISO/IEC 27001 accreditation date
16/08/2019
What the ISO/IEC 27001 doesn’t cover
There are no exemptions and therefore the Standard is fully covered.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
The protection of client information is core to our business. Our approach to information security is fully aligned with our ISO 27001 accredited Information Security Management System. This means that we meet all regulatory and legislative requirements and ensure these are embedded in our policies and business continuity plans. Our information security objectives and business continuity plans are reviewed regularly. These are effectively tested and implemented in the business. All policies are also communicated across the business to all staff who receive suitable, regular training. We ensure the security, integrity and confidentiality of information at all times. We maintain and regularly update a comprehensive information asset register and review all access to information to ensure it is protected from unauthorised access. All third parties and sub-processors who work alongside us are made aware of their obligations towards protecting all information assets. Any breach of information security, whether actual or suspected, is reported to Reference Point's DPO for investigation.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All service components are subject to rigorous proactive monitoring throughout the entirety of their lifetime. All service infrastructure and configuration changes are thoroughly assessed for potential security impact and go through an internal change control/ change approval and robust pre-implementation testing process before being deployed to production environments. Additionally all hosted services are regularly reviewed and subject to external penetration testing from a CREST-accredited supplier to ensure they meet relevant IT security standards and industry best practice.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
The underlying MS Azure platform is managed by Microsoft with regards to security and vulnerability management, as well as deployment schedules. All web browsers, Android and iOS Operating Systems are regularly updated by the OS vendors. As a result, Reference Point review all notified changes, vulnerabilities and security updates to ensure no negative impact on the Gencarda service and applications. We perform regular vulnerability scans and continually monitor information sources (such as OWASP) to maintain knowledge and expertise about potential threats that could affect our services and applications. If applicable, suitable updates are provisioned by us.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
The underlying MS Azure platform is managed by Microsoft which provides network level defences against DoS attacks and similar hostile attacks.

Additionally, Reference Point utilise the Azure web application firewalls and gateways to monitor and protect against malicious activity.

The configuration of these services for SkillGuard is reviewed by Microsoft Security technicians to ensure best practice is followed.

Exceptions and other alerts (e.g. around unusual traffic patterns) are automatically escalated to the technical support team at Reference Point.

Additional periodic review of WAF logs is also undertaken.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
There is a defined Incident Management procedure which would be followed. The key points are: Escalation and notification to relevant parties; Immediate analysis to enable confirmation and any immediate preventative actions to be taken. Capture of relevant details, log files, screenshots of incident for subsequent analysis; Development of (any required) actions to mitigate risks - both short and medium term. If required, notify relevant parties within statutory timeframes. Production of report following above. Clients will be notified in line with the SLA.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

As a company we are working towards gaining ISO 14001 certification.
Covid-19 recovery

Covid-19 recovery

Reference Point has a clear Covid-19 Risk Management strategy which is regularly reviewed and updated in line with the evolving pandemic
Equal opportunity

Equal opportunity

We have an equal opportunities policy which is adhered to and regularly.
reviewed/ updated.
Wellbeing

Wellbeing

Wellbeing is a staff priority within the business. This is communicated to all staff from senior management and is monitored.

Pricing

Price
£10,000.00 a unit a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tanya.morris@causeway.com. Tell them what format you need. It will help if you say what assistive technology you use.