WhosOffice.com
Manage and plan shift planning and rotas of any kind, including fixed workers and part timers along with overtime and manning levels. Also manage staff leave and out-of office times including holidays and absences. Optimised to work across multiple devices. Additional modules for Task Planning, HR and document storage.
Features
- Shift planning of any kind or rota patterns
- See total hours, manning levels and competencies across shifts
- Distributable and printable shifts and rotas
- Build and plan your shifts with complete flexibility
- Staff leave managed by multiple allowance 'pots'
- Multiple approval system or auto approve for leave
- User role permissions for streamlined user interaction
- Events for public holidays and organisation centred activities
- Easily accessible 'in app' help when needed
- Certified ISO27001:2017 for Information Security
Benefits
- Quickly plan and schedule any type of shift and rota
- Easily spot manning levels, staff competencies and hours worked
- Quickly distribute planned shifts and rotas to staff
- Centralise holiday/absence leave requests and approval process
- Report on staff working times, overtime and leave
- Multiple calendar views by group or department
- Task Planning and job assignment
- HR tools to record personnel details, appraisals, training and certifications
- Document storage
Pricing
£1.33 to £2.00 a user a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 1 1 5 9 7 7 2 5 5 6 3 7 2 0
Contact
WhosOff
Philip Cross
Telephone: 01227764806
Email: gcloud.enquiries@xdrive.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support available Mon-Friday 0900hrs-1730hrs within 2 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Email or telephone support to all users
No additional costs - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We offer an Assisted sign up option so new users can contact us upon sign up, and we can provide "hand holding" to help users get up and running.
In page help guides and help videos are also avaialable - Service documentation
- No
- End-of-contract data extraction
- Export to csv
- End-of-contract process
- Users can end their contract with 30 days notice. Users can export their own data via the application but we do not provide a service to export the data on their behalf.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Application is responsive all features are available
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- We monitor our connectivity and capacity to ensure demand is managed
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via the reporting section to export data
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.999
- Approach to resilience
- Available on request
- Outage reporting
- Email Alert
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Only Administrators have access to management interfaces
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- The British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 18/09/2016
- What the ISO/IEC 27001 doesn’t cover
- Nothing
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Certified ISO27001:2013
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All changes are managed through our management teams' challenge process. Assessing feasibility and benefit to the community as whole including impacts on security.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We monitor all our services 24/7
We undertake annual penetration and 6 monthly fail over testing . - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Physical hardware controls protect our networks.
Any suspicious 'in application' activity is reported in real time and accounts/IP addresses closed out. - Incident management type
- Supplier-defined controls
- Incident management approach
- We have procedures in place for incident reporting and control as defined within our ISO27001:2013 processes.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Having an easily accessible digital record of work place working times, absence and holidays can assist in monitoring staff well being and ensuring any trends are easily identified and actioned.
Pricing
- Price
- £1.33 to £2.00 a user a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- 1 month Free trial of the full system