Culture Shift
A safe and simple tool empowering people to report culture-damaging behaviour directly to their organisation. Our full-suite reporting, analytics and case management platform puts data at the heart of organisational culture change.
Features
- Customisable online reporting for bullying & harassment, option for anonymity
- User tested best practice reporting questions
- Real-time data analytics dashboard
- Community of practice events & annual learning conference
- Enterprise level data security
- Awareness-raising campaign assets and strategy
- Advanced case and content management system
- Expertly drafted support articles
- Name matching and free text search
- Risk assessment forms
Benefits
- Removes barriers for anyone who has experienced bullying & harassment
- Empowers organisations to support people when they need it most
- Allows customers to monitor, track and manage individual cases
- Real-time data analysis to gain deep understanding of culture
- Build trust and confidence in your reporting processes
- Benefit from shared experience and best practice through events
- Targeted communications and campaigns to encourage engagement
- Early indication & warning signs of culture-damaging behaviour
- Increase employee sense of belonging & reduce attrition
- Activate positive and lasting cultural change with more proactive measures
Pricing
£13,200 a licence a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 6 7 7 3 1 0 8 5 9 5 6 1 1 4
Contact
CULTURESHIFT COMMUNICATIONS LTD
Ash McDowell
Telephone: 07908814006
Email: ash@culture-shift.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
-
- Requires a web browser
- Opera and browsers deprecated by their vendor are not supported
- Web browser versions with greater than 0.2% of global usage
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We have an online support desk which notifies a number of people within the Culture Shift team who are able to respond to issues Monday to Friday between the hours of 9am to 5.30pm. Our response times are as follows:
1 hour response to acknowledge the ticket;
1 business day to investigate and provide a plan and resolution to the issue.
You will also have a dedicated Customer Success Manager who will be your main point of contact at Culture Shift for all queries. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
We have an online support desk included in your package which notifies a number of people within the Culture Shift team who are able to respond to issues Monday to Friday between the hours of 9am to 5.30pm. Our response times are as follows: 1 hour response to acknowledge the ticket, 1 business day to investigate and provide a plan and resolution to the issue.
You will also have a dedicated Customer Success Manager who will be your main point of contact for all queries and will schedule regular meetings to discuss queries, best practice, support and guidance.
For the Advanced and Expert packages, as well as a dedicated Customer Success Manager you will also be part of our community of practice. Combining the knowledge of all our partners. Our partners frequently come together to learn from each other, share challenges, collaborate in workshops, contribute to blogs and case studies, all to facilitate the collective learning of our Community.
As a partner you have a dedicated Customer Success Manager who will then direct all queries to the relevant contact for example if the query is technical, they will direct the query to our development team. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Onboarding can take as little as 4-8 weeks. This time is divided between Key Meetings, Required Actions & Technical Requirements.
KEY MEETINGS
Welcome Meeting with your key contacts from Culture Shift. (30 minutes). Prior to this your site will be created with our Best Practice Questions as default. During this we will also agree on a ‘go-live’ date for your system.
Kick-Off Meeting: Discuss the Required Actions + Technical Requirements to go live (1 hour)
Dashboard Training (1 hour). The software is intuitive and easy to use, after this training the team will be able to complete the majority of customisation themselves.
Weekly touchpoint with your key Culture Shift contact (15 minutes).
REQUIRED ACTIONS
Review reporting questions. Culture Shift will configure the reporting routes based on the information submitted. We will give you feedback on the questions based on our years of experience in creating Best Practice reporting forms. All amendments can be reviewed in advance of the site going live.
Review support articles. The Culture Shift team can provide recommendations and share examples.
Complete privacy notice
Provide logo and branding for the site
Confirm dashboard users and teams
TECHNICAL REQUIREMENTS
Confirm dashboard access preference (SSO/MFA)
Configure DNS settings - Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Monday
- End-of-contract data extraction
-
7 working days before a licence expires, all data will need to be exported from the system.
The data needs to be stored in a safe and secure environment, the encrypted password received from the Report + Support export must be kept somewhere safe. Usually IT departments will have systems in place that they would recommend for the storage of such important data.
Once the data has been exported, Culture Shift need to be informed that the export has been completed and it has been verified that the data is all out of the system.
It is also important to ensure that the data exported stays consistent with the organisations privacy policy and that information is redacted in line with the organisations retention policies.
The data held within Report + Support is extremely sensitive. Once the shutdown process and database deletion has started, there is no way to retrieve it. To ensure there is mutual understanding of this, Culture Shift requires your Data Protection Officer to sign a declaration confirming this. - End-of-contract process
-
Upon the end of an agreement, there are 3 steps to formally shut down the Report + Support site.
1. Unpublishing the DNS Settings:
2. Exporting your data: 7 working days before a licence expires, all data will need to be exported from the system.
The data needs to be stored in a safe and secure environment, the encrypted password received from the Report + Support export must be kept somewhere safe. Usually IT departments will have systems in place that they would recommend for the storage of such important data.
3. Site deletion:
On the day a licence expires, Culture Shift will delete your site, once the site has been deleted, we will have no access to your site, if necessary we can restore backups for 35 days for an additional fee. Past this date, no retrieval will be possible.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The layout of the reporting site will vary to fit the different screen size of mobile devices (responsive design is used). There are no functionality differences between the mobile and desktop services.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- There are two user interfaces, one for reporters to access support or make a disclosure, and another for caseworkers and administrators to manage the requests that come in and analyse those. Both are provided as web applications.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
We perform in-house testing using assistive technology tools, and have previously worked with partners who have undertaken their own user acceptance testing with users of those tools and fed that feedback back into the product.
We also engage with a third-party supplier to perform an accessibility test for us every year, we then assess the results and take action to remediate any issues where possible - API
- No
- Customisation available
- Yes
- Description of customisation
- The front facing Report + Support website is based on a common template but some aspects such as colours, fonts, logos, images and text can be customised to match your corporate identity.
Scaling
- Independence of resources
- We utilise a serverless architecture which scales automatically to respond to demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We can provide reports on number of logins and active users, as well as feature usage, such as how many users have accessed support and how many named and anonymous reports have been received. Some of these are exposed in the product as a dashboard, with others available on request.
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- There is in-product data export functionality.
- Data export formats
- Other
- Other data export formats
-
- Encrypted PDF
- HTML files in encrypted zip
- Encrypted XLSX files
- Data import formats
- Other
- Other data import formats
- None
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Minimum target availability = 99%, 24 hours per day, 7 days per week.
Availability metrics are the targets for the time that services will be
available, sometimes referred to as “uptime’: The availability figure is a
minimum target level and does not imply that services would be limited
to the availability outlined; e.g. services may operate at higher levels than the target.
On
receipt of written notice of any Service Fault from
the Customer, the Supplier will, at its expense,
use all reasonable commercial endeavours to
correct any such non-conformance promptly, or
provide the Customer with an alternative means
of accomplishing the desired performance. - Approach to resilience
- We operate in multiple availability zones and are designed to sustain the failure of a single availability zone with rapid failover away from a failure zone. We use a server-less deployment model to enable rapid scaling and response to failure.
- Outage reporting
- In the event of an outage, your Customer Success Manager or the Head of Success will contact the nominated lead for the partner by email to inform them of the outage and keep them up-to-date.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Access to management interfaces is controlled using a username, password and second factor TOTP token. In addition, for enhanced access levels the customer must grant access to a support worker within the customer's access management screen.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- CFA
- ISO/IEC 27001 accreditation date
- 06/06/2023
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
-
We have an IT Security Policy and handbooks which are followed. Manuals include an Information Security Manual Management Policies & Procedures, Information Security User Facing Policies & Procedures, Information Security Technical Policies & Procedures.
We perform annual reviews on our Information Security Policies and ensure they are in line with our ISO Accreditation and Cyber Essentials. We also ensure that there is a range of communication methods so that policies are easily accessible and that information is shared consistently within the team. All employees are empowered to raise concerns if they were to see a policy not being followed and we would seek to pro-actively and informally tackle behaviours at the earliest opportunity.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- We implement a continuous delivery change management process, where a continuous stream of small changes are made. Before entering the deployment chain, each change is first reviewed by an engineer and then accepted into a test environment. Each change is then verified in this environment by a QA engineer before being promoted to the production environment.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We use automated vulnerability scanning as part of our pipeline. Once a vulnerability is flagged then further changes which include that vulnerability are blocked until the vulnerability is assessed and deemed not in scope, a mitigation is in place, or an upgrade made (when available) to a version which removes the vulnerability. Vulnerabilities are treated as the second highest impact issues within the system after outages.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We capture logs relating to access and changes made to the infrastructure. If any changes from the expected configuration or unexpected access are found then an alert is raised for investigation.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- When an incident is detected, an incident lead is appointed who is responsible for co-ordinating the incident based on our incident management policy. This starts with collecting data to diagnose the root cause of the incident and then taking immediate steps to close off the incident, including communications or bringing in third-party specialists where needed. Once this is done and the immediate incident is resolved, a retrospective is undertaken which analyses the root cause and develops a comprehensive fix, including in any similar areas.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Tackling economic inequality
There is some evidence to suggest that people with lower socioeconomic status are at increased risk of bullying and harassment at school, university and work. This is partly because an individuals socioeconomic background often contributes to the positions they are able to get to in the workplace and power dynamics are often at play in cases of bullying and harassment. Culture Shift delivers against this social value theme by providing all people within an organisation with a safe and secure platform for speaking up about culture-damaging behaviours. Importantly the service gives them the ability to speak up anonymously so they do not have to fear repercussions or worry that their future career will be affected.Equal opportunity
Creating and encouraging a safe work environment and educating employees about culture-damaging behaviour is one of the key ways to ensure equal opportunities in the workplace - both of which can be addressed by implementing the Culture Shift platform. The platform gives all people in the organisation the opportunity to speak up about issues that matter to them, whenever is best for them, so that the organisation can act on the issues reported and creative a safe and welcoming workplace culture for all.Wellbeing
Employee wellbeing is enhanced through the ability to speak out about culture-damaging behaviours pro-actively, as opposed to employees needing to bottle up the issues which often results in presenteeism or time off sick with stress. A culture of trust between employer and employees helps to create a working environment where everyone can thrive and feel like their wellbeing is a priority.
Pricing
- Price
- £13,200 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- No