shineCompliance
shineVision is the leading independent UK multi-risk compliance management software company providing duty holders with risk management software which supports complete asbestos, building condition, fire safety, gas safety, heath & safety, mechanical & electrical and water compliance.
Features
- Real time reporting
- Automated risk and priority warnings
- iOS and Android multi-risk surveying app including QR code scanner
- Hierarchical account access with a full audit trail
- Automatic email updates and API link to third party software
- CAD Web visualiser
- Live Property Registers
- Secure tendering and technical workflow
- Technical quality assurance with change management audit trail
- Work/major work request and capital/programme works
Benefits
- Legislation Compliance, Guidance and Regulatory Change
- Workflow for Maintenance Team and External Contractors
- Support in Protecting the Duty Holder’s Reputation
- Support Integration of People, Process and Technology
- Maintain a Secure Infrastructure for all Stakeholders
- Live Recall of H&S Data from Single Source
- Improved Sharing and Collaboration within Technical/Maintenance Teams
- Resolves potential Conflict/Duplication of Data/Budget Resource
- Standardise/Sequence Processes and Procedures
- Install Culture of ‘Subscribe and be Updated’ on specific concerns
Pricing
£750 to £62,900 a licence a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 4 1 4 3 8 0 9 8 9 7 6 4 1 8
Contact
shineVision
Andy Fowler
Telephone: 07946448280
Email: andy.fowler@shinevision.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Remote access requires mobile signal/wifi. Critical planned maintenance/patching will be conducted at agreed point in time with the client
- System requirements
-
- Web Browser Access
- Site data entry requires ios/android mobile device
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Incident Service Levels
shineVision Support Priority Response
P1 - 1 Hour
Full System Failure, access unavailable for all users, system bug affecting all users/services
P2 - 1 Hour
Single or group of Users access failure e.g. Mobile access, system-related bug affecting services to single/group of users
P3 - 1 Hour
System/user related bug not affecting service but needs attention, user data error likely to cause major issues for client
P4 - 2 Hours
User data error likely to cause medium issues for client
P5 - 4 Hours
User data errors causing low/no impact for clients, system/user relating issue for consideration - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
A Technical Account Manager provided to all clients
Support is included in SLA which varies depending on the number of users/contractors.
All customers are provided with priority level trouble ticket access at no extra cost. We provide priority emergency support to site engineers during inspections/servicing.
Training resources including user guides and videos are provided. Shine also mentor internal superusers to facilitate client led support.
Service Hours:
• shineVision Software is available 24/7/365
• Studio Hours Monday to Friday 8am – 5pm (excluding 8 x English Public Holidays)
• Out of Hours Technical Support is offered at the discretion of the Support Team unless agreed - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Onsite and online training
Training Documentation and Videos
Contractor training/workshops - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
All customer data is provided in CSV file format including:
Audit Trails
Folder structure of all documentation
Plans & Photos provided - End-of-contract process
- All end of contract data is provided at no additional cost
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Main software - no differences
Data collection for site engineers conducted via ios/android app - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
Encrypted communication between web portal and surveying application.
Open API for communication with 3rd party software such as Asset, Helpdesk and Financial Software - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
All customers can customise features such as drop-down forms, reporting and dashboard information.
In addition, customers can work with the development team to provide additional functionality to suit the changes and requirements of customers.
Scaling
- Independence of resources
- The IT team have live monitoring of the dedicated hosting environment and the software usage placed on the service via remote monitoring.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Full evidential audit trail for responsibility and quality management. Data can be provided by everyone, department, contractor or individual user groups.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
Audit Trail, customisable reports available to download by users within the software with appropriate user-level permission. Report formats available include:
PDF
CSV
API - Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
- PDF via document scanner
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.95%, refund policy (if required) are negotiated during signing of SLA.
- Approach to resilience
- Tier 1 High availability virtual platform with multiple nodes at multiple data centres for resilience. Further details available on request.
- Outage reporting
- Internal dashboards and email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Locking mechanisms per user profile
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus ISOQAR via ISOMART
- ISO/IEC 27001 accreditation date
- 14/09/2023
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- One Compliance Cyber Ltd
- PCI DSS accreditation date
- 01/09/2022
- What the PCI DSS doesn’t cover
- N/A
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We have an Information Security Policy & Procedures and Data Protection & Policy & Procedures within our ISO and Constructionline Gold accredited management system. System is managed on Smartsheet, our internal priority and document management software which includes dashboard and email warning notifications. We have monthly management meetings and monthly audits of the management system. All company policies are reviewed annually or when there is a change to management system.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
ShineVision operate an ISO 9001:2015 management system and has Constructionline Gold, is supported by RapidSwitch, (an IOMART company) who are ISO9001, ISO27001, ISO22301 and PCI DSS accreditated. Intertek NTA who are CREST, CHECK Service Provider, PCI Approved Scanning Vendor and Cyber Essentials approved, provide annual and after a major release penetration testing.
Developer access is limited to production servers. Access to the live dedicated server for routine maintenance, bug fixing, and development is administered by the IT team. All access is agreed with the client and protected by secure shell protocol (SSH) with passwords reset every 30 days. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
ShineVision operate an ISO 9001:2015 management system and has Constructionline Gold, is supported by RapidSwitch, (an IOMART company) who are ISO9001, ISO27001, ISO22301 and PCI DSS accreditated. Intertek NTA who are CREST, CHECK Service Provider, PCI Approved Scanning Vendor and Cyber Essentials approved, provide annual and after a major release penetration testing.
IDS/IPS operates on our servers. Critical patches and are applied ASAP with the clients permission.
Routine maintenance, bug fixing, and development is administered by the IT team All access is agreed with the client and protected by secure shell protocol (SSH) with passwords reset every 30 days. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Access to the software is administrated by the client. User accounts have Password Security Standards, Enforced Password Rotation, Two-factor Authentication and Automatic Lock-out for Dormant Accounts.
The software has Job roles with associated users privileges which control what a user can view and edit within the software.
There is a full audit trail within the software that tracks user actions, date/time and IP Address.
Threats to the data are dealt with immediately with the clients permission. - Incident management type
- Supplier-defined controls
- Incident management approach
-
ShineVision technical support:
• Studio hours Monday to Friday 9.00am to 5.00pm
• Out of hours technical support
• Trouble ticket support within the software
• Telephone, TEAMS and email support
• Weekly trouble ticket reporting
• monthly management meetings (in person, telephone and TEAMS)
shineVision escalation process:
• TT has missed the agreed timescales - the technical manager
• If problem is still active after a further 2 hours – account manager
• If problem is still unresolved after 2 hours – managing director
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
The software eliminates duplication of site compliance visits by capturing all compliance information in one live register. Therefore reducing the number of contractors having to visit site. Software also captures information required to enable remedial works to be planned and costed remotely.
Pricing
- Price
- £750 to £62,900 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- No