Every HR by IRIS
Every HR By IRIS is a complete, cloud-based, modular HR management system designed specifically for schools and trusts. Whether you’re hiring, managing absences, preparing for performance reviews, or building culture, Every HR gives you the control and insight to create an environment where your staff can flourish.
Features
- Real time HR reporting
- Site wide licensing, unlimited users
- Trust Overview
- Payroll integrations
- Library of 150+ CPD accredited E-learning content
- Manage staff absence, performance and training
- End to end process for recruitment
- Workforce Census and Single Central Record
- Case management
- Dedicated support team via live chat, phone, and email
Benefits
- Make proactive rather than reactive decisions
- Ensure a consistent approach across HR processes
- Information is easily accessible and stored in one place
- Dedicated Implementation Specialist for onboarding
- Features to support with staff absences
- Multi Academy Function to implement certain modules, reducing admin time
- Streamline recruitment processes to assist with attracting the best talent
- Ability to update data en masse
- Reduction of duplicated work with the SCR and WFC modules
- Effortlessly track CPD hours
Pricing
£1,526.00 a licence a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 9 6 6 2 8 1 5 1 5 0 3 5 4 2
Contact
IRIS SOFTWARE LIMITED
Bid Team
Telephone: 0344 225 1525
Email: BidTeam@iris.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
-
- Web Browser
- Internet connection
- Wifi for mobile apps
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Creation of support tickets within 30 seconds
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
-
Every's web chat is available via all user accessible pages on Every, meaning the user has constant, easy one click access to support.
The web chat is provided by an established provider, who have done a self-audit under VPAT 2.1 accessibility standards set by the - Information Technology Industry Council (US),
VPAT 2.1 includes criteria from WCAG 2.0 and EN 301 549, as well as the Revised Section 508 Standards. - Web chat accessibility testing
- None
- Onsite support
- Yes, at extra cost
- Support levels
-
Technical and product support is provided through live chat, telephone and email channels in the first instance.
Should additional support be required then this will be escalated to the technical team who will assess the resources required and decide next steps. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Customers are allocated a unique Implementation Number and assigned a dedicated member of the Engagement Team whose primary role is to guide the client through the setup and implementation of the software.
On introduction with the client, an Engagement Specialist will discuss their priorities and expected outcomes from the implementation.
A bespoke plan is then created setting out the optimal way of implementing the system for that customer to achieve their expectations. The process is supported through phone calls, account reviews, webinars, user documentation and a project implementation tool for communication.
Once the system is set up, the customers are able to receive training either virtually or onsite at an additional cost. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Word
- Excel
- End-of-contract data extraction
-
The majority of core data can be exported by users through the report builder module or within certain parts of the system and these files will be produced as Microsoft Excel or Word formats.
We offer a data extraction service for additional data that is not directly available to users. This is offered at no cost if the data is not downloadable in the system, but for more complex extractions, there will be an additional cost.
Additional data (metadata) can be returned to the client within a set time period, as defined in the Terms and Conditions.
In the first instance, there are no charges for the return of data or switching off the service at the end of contract, however, additional data may be charged at a fair rate, where required. - End-of-contract process
-
The platform allows data to be exported into CSV/Excel/Word format. At the end of the contract the client data remains subject to the robust back up regimes for a short period before being marked for deletion/anonymising/pseudonymising, in line with our commitment to comply with the GDPR.
Additionally required data (metadata) can be returned to the client within a set time period as defined in the Terms and Conditions.
In the first instance there are no charges for the return of data or switching off the service at the end of the contract, however additional data may be charged at a fair rate where required.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The mobile service provides a subset of functions, specific to tasks that would be performed and are acceptable to update via a mobile device.
The desktop (web based) service provides more comprehensive functionality and reporting, however the mobile service provides all the functionality required for the scenarios it is intended to be used for. - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- API links through Wonde are in place to push and pull data between EveryHR and MIS systems. The level of detail and data pulled/pushed is dependant on the MIS system and their links with Wonde.
- API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Various parts of the system can be customised by the admin users, such as product branding, including webpage, report logos and titles. Key data categories can be customised such as user groups, access levels and certain system notifications, product branding (such as user groups, access levels, data partitioning groups) and certain system notifications (such as emails).
All the items listed above can be customised by user administrators in the settings part of the system.
Scaling
- Independence of resources
-
The service is provided by load balanced web servers with regional failover.
The performance and infrastructure of the software is monitored 24/7 and there is the possibility for more servers to be available on demand if required.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We continuously monitor system performance based on a few factors, such as page loading time and query return performances. Analytics are made available to customers in the form of charts, graphs and tables.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users are able to export data through a variety of inbuilt reports in Word or Excel formats. More detailed exports can be requested and Every will endeavour to meet these requests in a timely manner.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Word
- Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Guaranteed availability is 99.5% annually. Actual achieved availability is at 99.99%.
- Approach to resilience
-
The system is hosted within a UK data centre, with separate, load-balanced web and database servers.
Redundant Internet links, network connectivity and a multi-DC provider strategy reduce the risk from data centre failure.
All local disk arrays are RAID10 for additional resilience and all hosts and core networking devices are dual powered. Our host data centres are supported by at least N+1 electrical infrastructure with at least dual geographically redundant network feeds. The hosts also maintain an ISO 27001 managed Business Continuity and Disaster Recovery plan at a corporate level that seeks to ensure the maximum availability and integrity of service delivery, support and communications.
Catastrophic failure should result in downtime of no longer than 30 minutes. - Outage reporting
-
Planned service outages are notified to customers at least two weeks in advance by both messages within the system and by email.
Unplanned or emergency outages are notified to the customer by email.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
-
Access is limited to authorised personnel, as required solely to fulfil their role.
Customer permission must be given before any user data is accessed and all management interfaces and support channels are fully audited. - Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
Security governance is driven from board level and is fundamental part of all processes. We comply with Cyber Security Essentials.
There are policies and procedures in place covering: Information Security, GDPR, Acceptable Use, Stored Data, Access Control, Data in Transit, Physical Security, Disposal of stored data, System protection, software development and testing. These are issued to, tracked and followed by all personnel.
Internal and external training is provided on an annual basis and reinforced quarterly. - Information security policies and processes
-
IRIS operates using a full suite of policies and procedures, including but not limited to:
IRIS Group Data Protection Policy
IRIS Information Security and Acceptable Use Policies Summary
IRIS Data classification and handling policy
Personal data incidents reporting procedure
Engineering Personal Data Breach Policy
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All changes are tracked and monitored through the development / release cycle. All components are unit tested, manual tested and release tested prior to release. Regular automated penetration tests are run on test servers with release code, prior to release.
Tracking is recorded and monitored through project and issue management tools.
All component changes go through a formal process of scoping, specification, implementation, regression testing and release. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We follow the OWASP guidelines including security testing on our product for the OWASP Top 10 vulnerabilities.
In addition to our development procedures, the application is automatically penetration tested using software penetration testing tools at each major release. It is also penetration tested annually using a CREST accredited security company.
Our hosting environment is penetration tested on a monthly basis.
Patches are generally deployed immediately after they are approved for release, or as soon as practicable (after they are approved for release) in other cases. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Protective monitoring is provided covering both hardware/software failure and system attack/compromise.
Intrusion detection systems monitor system changes, as well as providing a comprehensive audit trail of changes.
Additionally, the system and applications are monitored live for availability and/or failures.
Audit trails and monitoring tools are used to identify issues or potential compromises.
Notifications are provided to key members of staff and prioritised accordingly. Target incident response time is immediate or as close to as possible. - Incident management type
- Supplier-defined controls
- Incident management approach
-
The incident management process is defined formally in the Information Security policy.
Users report incidents or suspected incidents to the internal service desk and these are then reviewed by one of the information security team. All calls, emails or live chat records are logged and tracked until closure.
Tickets are dealt with or escalated to the appropriate level (including board level) as appropriate.
In the case of major incidents a major incident report will be produced. For minor or non-incidents, feedback will be given to the users directly.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Equal opportunity
- Wellbeing
Equal opportunity
We are committed to ensuring equal opportunities at IRIS. Our CEO, Elona Mortimer-Zhika, celebrates diversity in our workplace and expects the culture and environment of IRIS to be based on mutual respect and free from discrimination. We are committed to delivering a competitive and fair employment environment. We put equality, diversity, and inclusion at the forefront of our decisions, monitor progress, take action to continually improve, and be transparent with our findings. We have a zero-tolerance approach to discrimination based on protected characteristics and any allegations of discrimination will be dealt with in line with our Disciplinary policies. We have several wellbeing groups, including Unique which provides support for physical or mental health conditions or neurodivergent people. We provide a variety of training schemes to all employees, regardless of any protected characteristic, and encourage progression through our organisation.
We are passionate about gender equality and are committed to building a diverse workforce. We have continued to invest in our range of programmes to support gender equality and support the women of IRIS so they can reach their full potential. These initiatives ensure that we continue to focus on making IRIS a great place to work, enable our people to flourish, improving gender pay equality and providing equal opportunity for all. IRIS Groups championing of women in leadership has been recognised as a Great Place to Work for Women. The executive team comprises of three female leaders and 11 male leaders.
Our Modern Slavery Policy sets out the ways in which we identify and manage the risks of modern slavery as a business, including risk assessment, risk mitigation and staff training. IRIS reviews all material suppliers and assesses whether any risks of slavery or human trafficking arise.Wellbeing
We are committed to engaging, supporting and empowering our workforce. We create an environment where they feel part of a team; from regular global company updates to social evenings and charity events. We’re a UK Best Workplaces™ for Wellbeing. We have over 40 Mental Health First Aiders, have a weekly workplace support group and offer a free Employee Assistance Programme and bereavement counselling. We have several wellbeing groups and celebrate diversity. We offer colleagues a cycle scheme, private medical insurance and reduced gym memberships. We hold company fitness challenges and provide free fitness sessions. We’re proud to be a Real Living Wage employer, provide UK cost of living support, offer a tech and car scheme and give access to money coaches, workplace ISAs and pension, life assurance and critical illness cover. We seek our employees feedback on benefits that matter to them.
We give our employees three ‘Giving Back’ days a year on top of their annual holiday entitlement to support local community and national charitable cause. Employees are encouraged to actively give their time and skills to fundraise for a charity of their choice and volunteer on community projects, including being a school governor, charity trustee, reading with school children through the Benchmark scheme, mentoring in schools and running money management courses, both externally in conjunction with charities and schools, as well as internally with IRIS employees.
Pricing
- Price
- £1,526.00 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- No