Climate Change and Sustainability Application
Highly configurable software application which allows users to collect and then display the Climate Change impact of a certain asset – and assess it against other assets in a portfolio (i.e. a ship, a vehicle, a plane or an industrial site).
Features
- Highly configurable
- Easy to Use User interface
- Inputs can be copied and pasted directly from Excel
- Provides electronic audit ledger for past decisions
- Allows user to conduct ‘what if?’ decision analysis
- Shows historical fuel usage – and forecast
- Allows different assets to be compared against each other
- Multi Criteria Decision Analysis
- Programme Value for Money Analysis
- Learning and Development Tool
Benefits
- See Climate Change consequences of portfolio decisions immediately
- Review asset’s Climate Change performance and set future performance metrics
- Can compare possible portfolios against defined Climate Change scenarios
- Used to create consensus on policy issues from multiple stakeholders
- Provides an interactive, inclusive, multi-dimensional way of decision making
Pricing
£5,000 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 3 6 8 6 7 7 2 2 1 7 5 5 2 9
Contact
HAWKROSE LTD
Robert Fern
Telephone: 07966153588
Email: rf@hawkrose.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- No
- System requirements
- There are no specific system requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Hawkrose can provide Email based support or support through a dedicated ticketing system.
Support models are tailored to customers’ requirements and based on agreed SLA’s. Response times and support coverage is agreed and documented in a managed service agreement and tailored to the requirements of each customer and system deployment. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Support models are tailored to customers’ requirements and based on agreed SLA’s. Response times and support coverage is agreed and documented in a managed service agreement and tailored to the requirements of each customer and system deployment.
The Hawkrose standard approach is to offer three levels of support:
• Bronze – UK Office hours support with email-based fault notification
• Silver – Extended hours (07:00 – 22:00) 7 days per week with email-based fault notification and trouble ticketing system
• Gold – 24/7 support 7 days per week with email and phone-based fault notification and trouble ticketing system
Bespoke support packages can be agreed based on a Service Level Agreement with time to respond targets if required.
All customers are allocated a technical account manager to act as a point of escalation if required. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
The Tool can be delivered as a hosted managed service or deployed into a customers’ hosting environment. If deployed into a customer hosted environment a deployment guide is provided and training given to support system upgrades.
User guides are provided as standard, and training can be purchased as an additional service. This can be online or onsite, depending on customer requirements. Hawkrose also offer continuous user support packages where Hawkrose consultants can act as expert users. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
The standard approach to data extraction is through the CSV export function within the tool.
Normally clients retain ownership of their data and can export it, and request data is wiped from the system at the end of a contract. This would normally be agreed upfront and forms part of the overall data security agreement. - End-of-contract process
-
Often, at the end of a contract there are two scenarios
i. the customer wants to continue to use the service – so asked for a support a maintenance contract.
ii. The contract concludes – all outputs from the system are provided to the customer, alongside and reports/deliverables specified.
Project price often covers 1. Reconfiguring the system to meet customer requirements; and 2. conducting data analytics with the system to provide the customer with insight and decision making quality information for outputs; 3. User training and user guides; 4. six month additional support an maintenance.
Additional costs are associated with extending the use of the system.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- No
- Customisation available
- Yes
- Description of customisation
-
The tool is designed to be highly configurable, and all inputs can be ‘copied and pasted’ direct from excel – this mean that the tool can be rapidly amended to conduct Climate Change analysis of different assets and portfolios with no support from Hawkrose.
The configurability of the tool is its major selling point as it can essentially be used by any project team.
Scaling
- Independence of resources
-
The strategic choices tool is typically deployed as a separate instance per customer on dedicated infrastructure to avoid any performance impacts.
Within a single instance, the system can be auto-scaled during periods of high usage to ensure that the application is available to all users within the agreed SLAs. Optimisation runs are queued to ensure optimum performance however a priority system can be implemented if required.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Service metrics can be provided on a wide range of parameters. These include:
• Service level metrics such as, system up time, CPU usage and run time of optimisations
• User level actions such as, new user added, data extracted, or optimisations run
• Usage level data such as, log in and log out time stamps
Additional metrics can be configured, captured and reported on based on customer requirements.
N.B. Some monitoring systems may be blocked by customer firewalls if the system is hosted on a private cloud network. - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The standard data export process can be triggered by a user with the correct permissions through UI. The standard export format is CSV however other export processes and formats can be developed based on customer requirements.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Availability targets are agreed with customers at the start of a project and documented in a service level agreement, or managed service agreement.
Penalty charges are typically paid in service credits if explicit availability targets have been agreed and missed. Planned maintenance and outages caused by a customer’s own cloud hosting environment are excluded from any availability calculation. - Approach to resilience
- Dependent on customer requirement and available on request.
- Outage reporting
- Any outages are reported to the customer through email alerts triggered by system monitoring software. Depending on the agreed service level, outages may also be tracked in the dedicated ticketing system.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- The system uses Role-Based Access Control so that each user only has access to parts of the system to which they have been given permission by the system admin.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Details available on request
- Information security policies and processes
- Details available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Configuration management is automated, allowing system changes to be tracked and rolled-back if required.
Hawkrose works to a structured change management process. Changes are requested by a customer and documented by Hawkrose consultants or developers. Any requested change is estimated and any system impacts identified. The change request must be signed off by the customer lead and Hawkrose technical project manager in order to be initiated. Documentation is stored on the Hawkrose file system and forms part of the permanent system record. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Details available on request
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Potential compromises are detected through system monitoring. Response times depend on the SLA level chosen by the customer.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Our incident management approach follows the ITIL seven step approach for handling incidents:
1. Incident identification. This is either through system monitoring or a customer reporting via telephone or email.
2. Incident logging. The issue is logged and classified but the service desk.
3. Incident investigation and diagnosis. First line support will attempt to resolve the issue.
4. Incident assignment or escalation. This is if first line support is unable to resolve.
5. Incident resolution. A report is sent to the user describing the issue and its resolution.
6. Incident closure
7. User satisfaction survey (if necessary)
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
All Hawkrose decision support systems –including this one – have the ability to show users the Carbon usage of different procurement scenarios. This means that the system can have a strategic impact on an organisations understanding – and hence action – of the Climate Change implications of their programme.
Pricing
- Price
- £5,000 a unit
- Discount for educational organisations
- No
- Free trial available
- No