Skip to main content

Help us improve the Digital Marketplace - send your feedback

BCS LEARNING & DEVELOPMENT LIMITED

Skills development platform

Skills mapping platform, built to layout for IT leaders, L&D leads and HR departments the digital skills existing within your organisation. Build role profiles, career pathways and demonstrate development opportunities for your staff, all built around the SFIAplus framework, or your own frameworks such as Government Digital and Data..

Features

  • Real-time reporting
  • Remote access
  • Additional frameworks can be added and used for role creation
  • Industry standard role profiles
  • Visibility of skills currently within the organisation
  • Creation of development lists and plans
  • Single sign on functionality available
  • Benchmarking against frameworks
  • Benchmarking against multiple role profiles
  • Access to SFIAplus framework

Benefits

  • Ability to focus learning budgets on priority areas
  • Increase staff retention
  • Industry standardised role profiles for all users
  • Can be used across multiple departments within an organisation
  • Visibility of skills needed for the future
  • Assist with organisation planning
  • Career pathways

Pricing

£3,830 a licence a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at nicole.church@bcs.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 9 5 9 3 6 4 9 6 0 8 5 7 9 2

Contact

BCS LEARNING & DEVELOPMENT LIMITED Nicole Church
Telephone: 01793417493
Email: nicole.church@bcs.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Notification will be sent to key contacts ahead of planned down time and updates provided on unplanned downtime.
System requirements
  • System license to access the tool
  • User licenses for each user to log into the system
  • Latest version of Edge or Chrome

User support

Email or online ticketing support
Email or online ticketing
Support response times
Responses within 1 working day. Working day is 9am - 5pm Monday to Friday except for Bank Holidays and from Christmas Eve to the first working day of the New Year.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
Project management and account management support available throughout deployment of the system within an organisation. General query support is included as part of the deployment and agreed proposal/contract.
Technical support is available for escalated issues where the query cannot be resolved by project manager or account manager.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite, virtual and training documentation is available to users to access the system and carry out the required activities. On initial deployment of the system BCS will upload user details and trigger a registration email to be sent to users, users will need to register including setting up of a password before access the system.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Word
  • Videos
End-of-contract data extraction
Exports available in the system for details to be exported ahead of end of contract date.
End-of-contract process
BCS will clear all data from the system for the client at the end of the contract. There is no extra cost for this.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Web browser interface
Users will be set up in the system and sent a registration link to be able to access the system to carry out role profile creation, framework and role profile benchmarking.
Security levels are set within the system to restrict who is able to see users details and the ability to make changes to the contents of the system - role profiles, organisation frameworks - Government Digital and Data.
Accessibility standards
None or don’t know
Description of accessibility
Using a URL
Accessibility testing
We are working towards ensuring the system is WCAG 2.1AA compliant and will be carrying out the testing needed to achieve the standard.
API
No
Customisation available
Yes
Description of customisation
Deployments of RoleModelplus will be scoped and tailored to the customers requirements - completion date, budget and approach. Train the trainer is available for certain sections of a deployment.

Scaling

Independence of resources
We guarantee the system to be available 98% of the time. Clients have their own unique site and usage is monitored by BCS.

Analytics

Service usage metrics
Yes
Metrics types
Last user log in details, also developing the system to provide details of changes in skills gaps over time.
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Using the export options available in the system. Reports can be run and exported by Customer Administrators.
Data export formats
  • CSV
  • Other
Other data export formats
  • Word
  • Xls
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We guarantee the system to be available 98% of the time. Clients have their own unique site and usage is monitored by BCS.
Approach to resilience
Available on request
Outage reporting
Email notification and message on the log in page to the system

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Security levels for all users can be set by BCS/client administrator to ensure only those users who need additional access are provided with access. Users can only access the system once set up and have registered to use the system. A registration email will be sent to all users to set their access up and set a password.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Lloyds
PCI DSS accreditation date
12/06/2023
What the PCI DSS doesn’t cover
Details available on request
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Mandatory training for all staff on security policies. Security policies and processes are available to all staff through an intranet page and if needed from their manager.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Software components are tracked through Git repository version control. IaaS components are managed via AWS Systems Manager. New sites are pen tested and then again after major changes. All systems get regular vulnerability scans.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Systems are frequently or continually scanned using vulnerability scanning tools. New sites and new infrastructure are pen tested and then again after major changes. High and Critical level security patches are always applied within 14 days of release. Threat information comes from our suppliers (WAF, Managed IDS etc), NCSC Web Check findings, monitoring of supplier security blog posts and general IT security news.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
On call team available 24/7 to receive and immediately respond to security alerts from our own alarms (e.g. root access using, unusual authentication errors) and from our Managed Detection & Response (IDS) provider. Security log data such as WAF logs are regularly reviewed and potential threats mitigates with new WAF or rate limiting rules.
Incident management type
Supplier-defined controls
Incident management approach
Procedure is reviewed at least annually and covers:
Unplanned interruption to IT service, reduction in the IT quality, configuration failure item that has not yet affected an IT service but may do in future. 

Pre-defined incident procedure exists for ownership, categorisation, prioritisation, investigation, resolution, escalation, documentation, and closure of incidents. Malware response procedures applied if the categorisation of the incident requires.

Incidents are reported via:
Alerting monitors and alarms
Users of services report incidents to Service Desk in person, by telephone or by email.

Incident reports created and reviewed by assigned owner of incident.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

Cycle to work and car share schemes are in place and staff encouraged to use them. Lightening in the offices are controlled and lighting is split into sections ensuring lights are only on in areas they are needed.

Equal opportunity

BCS has an equal opportunity policy in place ensuring no-one is discriminated against for their sex, marital status, age, religion, colour, race, nationality, ethnic origin or disability.

Wellbeing

Wellbeing support is available to all BCS staff to help with mental and physical health. There are a number of mental health trained first aiders with additional training being provided to managers.

Pricing

Price
£3,830 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full access to the system for two weeks. Deployment option made available will be agreed with account manager and client.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at nicole.church@bcs.uk. Tell them what format you need. It will help if you say what assistive technology you use.