WhosOff.com
Centralised staff leave and absence management. By employing simple user facing controls to allow staff to request holiday, whilst behind the scenes managing your organisations' leave rules. WhosOff can take as much of the decision making process on as you desire, allowing you time to focus on other duties
Features
- Centralised staff absence management
- Approval system for leave and overtime
- Up to 30 different leave and overtime types
- Award winning support
- Certified ISO27001:2013 for Information Security
- Free apps for iPhone and Android
- Calendar feeds to see leave in client apps (Outlook/Google)
- Tools to manage year end processes including carryover
Benefits
- Self service of leave requests and absences
- Reporting tools for administrators
- Save time dealing with holiday and absence requests
- Track any leave types including sickness
- Bradford factor scoring
Pricing
£0.95 to £1.45 a user a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 3 1 8 7 1 7 9 4 8 2 0 4 2 2
Contact
WhosOff
Philip Cross
Telephone: 01227764806
Email: gcloud.enquiries@xdrive.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support available Mon-Friday 0900hrs-1730hrs within 2 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Email or telephone support to all users
No additional costs - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Users are free to sign up and trial the system at anytime. The trial uses the full system with no restrictions.
A welcome email is sent on sign-up with tips for getting started quickly. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Export to csv
- End-of-contract process
- Users can end their contract with 30 days notice. Users can export their own data via the application but we do not provide a service to export the data on their behalf.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Application is responsive all features are available
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Read only API available
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- We monitor our connectivity and capacity to ensure demand is managed
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via the reporting section to export data
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.999
- Approach to resilience
- Available on request
- Outage reporting
- Email Alert
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Only Administrators have access to management interfaces
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- The British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 18/09/2016
- What the ISO/IEC 27001 doesn’t cover
- Nothing
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Certified ISO27001:2013
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All changes are managed through our management teams' challenge process. Assessing feasibility and benefit to the community as whole including impacts on security.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We monitor all our services 24/7
We undertake annual penetration and 6 monthly fail over testing . - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Physical hardware controls protect our networks.
Any suspicious 'in application' activity is reported in real time and accounts/IP addresses closed out. - Incident management type
- Supplier-defined controls
- Incident management approach
- We have procedures in place for incident reporting and control as defined within our ISO27001:2017 processes.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Having an easily accessible digital record of work place absence and holidays can assist in monitoring staff well being and ensuring any trends are easily identified and actioned.
Pricing
- Price
- £0.95 to £1.45 a user a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- 1 month Free trial of the full system