Public Sector Data Unification Platform
DeepMiners Public Sector Data Unification Platform deploys AI to unify private and public data, breaking down data silos, enabling rich analysis across multiple attributes supporting decision-making and, economic policy design, delivery and measurement.
The service enables a practical, incremental approach to guide stakeholders through the change to a data-driven organisation.
Features
- Multidimensional relationships between multiple data points enabling multiple data views
- AI and database technology driven data acquisition, processing and matching
- Accepts un-processed and unstructured data in multiple formats and interoperable
- Creates unique identifiers for core data points e.g. business, person
- Permission-based analysis across multiple dimensions e.g. place, organisation, person
- Data integration facility into business systems and reporting tools
- Data unification and retention rules fully customisable, agreed with DPOs
- Guided GDPR-compliant data governance and data sharing policy development
- Customisable user views, dashboards and APIs
- Exceeds Government Data Standards. Cyber Essentials plus certified
Benefits
- Drives Public Service Reform enabling efficiencies and collaboration
- Breaks down silos, saves time for data collation, connection, cleaning
- Standardises data formats, generating metadata without need for expensive ETL
- Enables analysis across multiple, cross-cutting public and private data sets
- Unified data to inform, target and measure policy across sector
- Supports data connections and linkages without requiring expensive centralised systems
- An incremental, practical approach facilitates stakeholders through the change journey
- Scalable solution enabling incremental growth with iterative release of value
- Multi-layer security model facilitating intra-organisation data sharing policies
- User driven, accessible, highly customisable
Pricing
£25,000 a licence
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 4 2 6 2 6 1 9 6 5 7 7 4 7 5
Contact
Deep Miner Ltd
Duncan Hart
Telephone: 07958470315
Email: duncan@deepminer.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- Newly available data will be processed and updated daily during an agreed maintenance window. Users can access the service via the internet but their network administrators may need to share the network IP address(es) or greenlight the service DNS. Data can be shared back with user systems via REST API.
- System requirements
- Software licence, including updates and maintenance
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Questions and tickets will receive an initial response within 24 hours during core hours (9 a.m. to 5 p.m.). If there is something to be troubleshot, an indicative timescale for correction will be shared once the issue has been explored, and progress updated directly to the consumer.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Support levels are agreed with each customer and will include any required changes to standard response times and services hours for break fix support as well as ongoing data uploads/refresh in line with specifications.
User questions and issues will be dealt with according to the process outlined above.
An account project manager is assigned to each customer to deal with any other issues and to direct the further development of the product, including the addition of new data sources and functionality. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
The DeepMiner solution is typically implemented as a core component of a broader data-driven change and collaboration programme. Our onboarding approach is therefore tailored to support the customer's programme particularly aimed at facilitating visualisation and exploring the art of the possible in the early stages, addressing data sharing challenges and enabling incremental release of value as the implementation scales.
The approach follows the government's digital standards and typically incorporates the following stages.
Exploration - includes customer needs, uses cases, data sources and ownership, risks and data governance.
Key success factors are identified along with risks, governance principles and Alpha Definition.
Alpha - includes refining of use cases (up to 3); User sessions; Identification of data required, sources and ownership; Data Sharing/Processing agreements and GDPR Compliance along with Security Governance.
Key success factors are identified along with initial Architecture, Data Sharing, Data unification and cleaning, Data quality, Accessibility considerations and an initial Alpha product.
Beta Launch followed by Implementation v1.0 deployment live
Our post-live service supports long term Continuous improvement as a pathway to a unified data organisation.
Full documentation, training and user familiarisation sessions are provided at key stages of the process. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Users can extract all of their data at any time during the contract.
At the contract end, all proprietary user data can be extracted and deleted following customer requirements and proof provided. - End-of-contract process
-
End of the contract is usually negotiated with the customer.
Typically a detailed process and timeline is agreed and put into place with agreed outcomes.
Generally, any proprietary data is deleted from the system, should access be required beyond the contract end date, an extension would need to be agreed to cover any costs to effect any transfers.
Following execution of the termination process, all access to the system would be disabled, and proof of data deletion provided.
Any additional Developer work required for example to transfer data to a new system would be negotiable.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Certain applications may not be suitable for mobile use, for example, PowerBI and certain features may not be available depending on customer requirements. depending on customer UI development certain features may not be optimised for mobile.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
-
DeepMiners platform has been developed to be interoperable with multiple user Interfaces.
DeepMiner offers 3 methods to access the data held in the system.
1. Dashboards
Due to the complex and multi-layer nature of Public Sector data, it can be necessary to develop custom-built dashboards.
DeepMiner can develop with their customer a suitable solution.
2. Self-service
Users are able to have a self-service interface that allows them to build their own interfaces using in-house or external teams.
3. Interoperability
Customers are able to request that outputs are pushed to their preferred interface whether that be legacy or new. - Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
Our interface technology is designed with our customer users in mind and would typically include design and then direct user testing to ensure that feedback from the most appropriate users is obtained.
DeepMiner normally identifies customer requirements and builds towards them, taking into account functionality. - API
- Yes
- What users can and can't do using the API
-
Configurable upon discussions with customers
Numbers are unrestricted
Endpoints can be set up for different use cases - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Service has been designed as a platform.
Customers can take data from API and create own solutions/dashboard/UI and/or integrate with other Line of Business applications and reporting systems.
Scaling
- Independence of resources
-
The platform has been developed for delivery at scale including backups, flexibility on compute power, load balancing, etc.
The size and scale of the platform is normally discussed with the customer to ensure the most efficient architecture is employed to deliver data processing and storage at the most effective and cost-effective level.
Typically, we find customers have varying scale demands and can range from small to large teams.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Dependent on Customer requirements and normally negotiated with the customer, but typically involves user logging of activities (such as sign-on, data downloads etc.)
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Data exporting would be agreed upon as part of the service delivery.
Multiple options are available, whether this be through an admin dashboard, User Interface, API's, or CSV's through a self-service platform.
Typically data extraction is permission based and restricted based on the users access privileges, and would be logged. - Data export formats
-
- CSV
- Other
- Other data export formats
- JSON
- Data import formats
-
- CSV
- Other
- Other data import formats
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Availability is agreed with the customer. Typically above 95% during core hours (9 a.m. to 5 p.m. GMT) is the target to meet or exceed.
DeepMiner will look to agree on the exact levels of required availability with the customer to ensure that the optimum level of service and support is delivered. - Approach to resilience
- Available on request.
- Outage reporting
-
Outages are reported via email alerts, either automated or manual when an outage occurs.
Regular updates would then follow by email.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Username or password
- Access restrictions in management interfaces and support channels
- Yes
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- DeepMiner ensures that security meets or exceeds a level of CSA CCM version 4.0. The architecture and technical processes are agreed with clients and staff are trained accordingly. The application is pen-tested annually and any remediation suggestions are implemented swiftly, prioritised by their severity and potential impact. Risk management, business continuity and operational resilience form part of governance and development, as do change control and configuration management. Endpoint management, cryptography, encryption and key management are core to application architecture and cloud management. Human resources are trained and access the product using identity and access management systems. Incident management in place.
- Information security policies and processes
- Information security is assured in the product using the onion model of defense in depth and with the company using governance standards and staff training. The application is designed to answer data integrity, confidentiality and availability at every level as required by permissions. Risk management and disaster and incident planning are used prospectively as well as retrospectively in order to ensure the highest level of protection possible. The technical product owner reports on implementation as part of the monthly reporting cycle and the senior developer checks ongoing development work and maintenance to ensure that all features comply with the policies. The technical product owner also checks the press regularly to identify whether any newly-identified risks are potentially relevant to the product. The CTO is in charge of ensuring that the product is secure to a level commensurate with the CSA CCM version 4.0 standards.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Each dataset and feature is reviewed with the client and any work is planned in agreement with them. User experience review of features is tested and user feedback is reviewed by the product owners on both supplier and customer sides. All technical updates are assessed for impact using technical and non-technical risk management and subject to the change management process agreed with customer DPOs, i.e. any proposed change to the underlying data or matching processes need to be agreed with the latter prior to any work being undertaken.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Threats are assessed with regard to potential severity and sensitivity. The product architecture and access protocols were designed to reduce the threat of attack and developers are trained to identify and report any issues or potential issues they find.
Security patching is implemented within 24 hours during working days, immediately where possible. Other patches are scheduled in accordance with their severity and impact on the system, but within 7 working days maximum.
Threats are identified from software providers, in the press, from security newsletters and from penetration and other prospective testing we do ourselves as part of a red-hat exercise. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Access to the application is logged and is by password and IP greenlisting. These records will be analysed for benchmarking and then an automated system will be implemented to identify potential compromises. The response will differ depending on the compromise, but will include the following steps:
1. identify the potential route of compromise and shut it down immediately.
2. Inform the customer that an issue has been found and is being investigated.
3. Identify the scale and risk of the issue.
4. Inform the customer of the outcome of the investigation.
5. Undertake remedial works and/or inform data owners/ICO. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- There is a pre-defined process for any issues users confront. Users can report incidents and issues via email. (Serious incidents can of course also be reported directly to the product owner.) Any reported issues will be acknowledged within one working day. If unclear, the user will be contacted for more detail on the problem. The issue will then be categorised and prioritised, and any suggested action will be shared with the customer for review, except in the case of highly sensitive or security-relevant technical issues, which will be addressed immediately. Reports given to the users and product owner (monthly).
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Other
- Other public sector networks
-
- CRM2
- HIE CRM
- SOSE CRM
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Equal opportunity
Fighting climate change
DeepMiner is working hard to reduce our carbon footprint. We are part of a member organisation who plants trees on our behalf for every year we’re in membership to ensure offset of carbon emitted.
To ensure the security and scalability of our solutions we develop and deploy primarily through AWS, a cloud provider. AWS is working towards being fully powered by renewable energy by 2025, partly by investing in renewable energy in Scotland and other UK.
When reviewing additional suppliers, apart from Technical performance commitments to reducing environmental impact is a significant selection criterion.
DeepMiner seeks to use existing resources, physical and technical, wherever possible, which unlocks further value from client sunk costs and improves efficiency and speed of development and deployment.
DeepMiner powers off resources that are not in use, saving both resources and expense. While we are currently working remotely, we have encouraged the switch to renewable-powered energy suppliers for home offices.
DeepMiner prefers public transport for business travel and commuting, where possible, which both keeps expenses down and is better for the environment.
DeepMiner is in the process of preparing an Environmental Sustainability Plan and setting targets to decrease our carbon footprint further, based on the Net Zero Nation suggestions for business
(https://www.netzeronation.scot/take-action/businesses/greener-business).Covid-19 recovery
On of the core reasons for the development of our systems was due to COVID-19. Our mission is to help national governments use data to help drive economic development and support.
The objective of our platform is to enable policy to be designed using the best possible data, to drive employment opportunities in high growth sectors, by making it easy to identify these companies and to understand the demographics of the nation to ensure upskilling and re-skilling can be developed.
By identifying companies accurately and quickly, Governments can create policy and delivery mechanisms that target those sectors that generate growth and opportunity.
Creating efficiency and collaboration across agencies can ensure that organisations and those communities worst affected by covid receive the correct financial and non-financial support that is correct for their circumstances and not just one size fits all.
As a company, DeepMiner is an organisation based in its community. We actively take part in local initiatives and meetings to support companies and often give advice to organisations who are looking to use Data for their business pro bono.Equal opportunity
DeepMiner is committed to enhancing equality and diversity within not just our team, but our sector.
By offering a four-day week we have introduced a reduced work pattern for all genders, thereby destigmatising part-time and flexible working for women, those with caring responsibilities or those with disabilities.
We have also changed our recruitment practices to minimise unconscious bias through the use of name-blind sifting, adapting the wording used within job descriptions and offering interviews avoiding times schools typically start or end.
Our current team come from a mix of socio-economic backgrounds, genders, religions and countries. 20% of the team would consider themselves disabled, a further 20% of the team is neurodiverse, 50% of our team are female, and, of course, we have a female co-founder.
The team are committed to bringing more diversity into our sector and regularly take part in outreach through the STEM Ambassador programme, SmartSTEMs and various opportunities to talk to both school children and university students about our field.
Pricing
- Price
- £25,000 a licence
- Discount for educational organisations
- No
- Free trial available
- No