ASSURE Environment Suite - Public Protection
ASSURE Environment Suite – Public Protection is a configurable, intuitive software solution that is browser based and device agnostic, designed in partnership with Local Authorities. Our focus is on automation and efficiency, specialising in Environmental Health, Licensing, Trading Standards, Managed Contracts and Private Sector Housing.
Features
- All Licensing covered; Taxis, Alcohol, Gambling, HMO, Animals and more
- Built in real-time reporting tool
- Embedded GIS
- Integrated document management
- Automated renewal, expired document and fee reminders
- Offline mobile capabilities
- Public facing applications and enquiries
- Highly configurable with ability to add bespoke information
- Single Sign On abilities for both officers and public
Benefits
- Automated processes save officers' valuable time
- Low maintenance, real-time mapping from Ordnance Survey ensuring up-to-date mapping
- Browser-based solution enables officers to work anywhere, on any device
- Consistent, intuitive experience across all modules reduces training needs
- Configurable validation on public applications ensures minimal officer intervention
- Holistic view of data allows for intelligent decision making
- Supports your digital transformation and channel shift strategies
- Facilitates self-service with intuitive customer portal reducing burden on staff
- Enabler, rather than a barrier, to service redesign
- Open integration strategy, no need to reinvent the wheel
Pricing
£99.17 a user a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 7 2 5 7 6 2 5 5 3 6 9 6 7 4
Contact
NEC SOFTWARE SOLUTIONS UK LIMITED
NEC Frameworks Team
Telephone: 07852 936231
Email: frameworks@necsws.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- No
- System requirements
- Entirely browser based, HTML5 compliant browser appropriate memory (usage depending)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
All logged incidents or service requests are acknowledged immediately via NEC’s ITSM Support Portal. Timescales will vary in accordance with the priority of the logged ticket, and our targeted response times during contracted support hours are as follows:
Priority 1 (Critical): service unavailable to end-users - 15 working minutes
Priority 2 (Medium): partial loss of an important business function for end-users - 30 working minutes
Priority 3 (Low): low impact on End-User operations where processing can continue - 60 working minutes
Priority 4 (Minor/ guidance and advice): problems affecting 1 or 2 end-users – 1 working day - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
NEC provides a single level support service, included in the standard charge for the solution. The details of the support services are:
Available 24x7 excluding planned/emergency maintenance.
Support response available 09:00-17:30 each Business Day.
The solution achieves a minimum of 99.5% availability.
End-users can log tickets online 24x7.
The end-user has the option to assign the priority when logging the ticket, as follows:
Priority 1: Service unavailable to end-users/complete loss of a critical business function/security breach.
Priority 2: Partial loss of a business function at a critical time in the business cycle with medium impact on end-user operations/performance degradation affecting 25% or more of end-users.
Priority 3: Minor problems with low impact on end-user where processing can continue/performance degradation affecting less than 25% of end-users.
Priority 4: Service Requests/problems affecting 1 or 2 end-users.
NEC uses reasonable commercial endeavours to provide identification and resolution, obviation and/or mitigation of operational bugs/errors reported by the customer in the solution in accordance with these timescales:
Priority 1: 4 working hours.
Priority 2: 8 working hours.
Priority 3: 36 working hours.
Priority 4: 72 working hours.
Client Services Manager manages the ongoing relationship, cloud/support engineers allocated as appropriate to resolve any technical issues. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
In order to effectively use the ASSURE Environment Suite there is an onboarding phase which can involve:
• Configuration services, with an experienced Consultant designing the system to suit your requirements
• Training, which can be delivered onsite or remotely
• Data migration from existing system (this is an additional charge based on client requirements using the appropriate SFIA rates)
• Extensive help for users in the form of Online Help files, Release Notes, customer forums, “how to” video library etc. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Throughout the duration of the contract you can use the reporting facilities to extract your business data from the service. We can carry out an audit, for an additional cost, to agree the scope and format of data to be extracted. Following this, we will provide a fixed price to extract the data based on the SFIA rate card.
- End-of-contract process
- In the lead up to the end of the contract term we will discuss options to enter into a new agreement and extend the service or the process of decommissioning the service and providing the customer with a copy of their data. Following this, we will provide a fixed price to extract the data based on the SFIA rate card.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The ASSURE web application is entirely browser based, so there is no difference between the mobile and desktop service. There is also an additional module available with ASSURE which is an offline mobile app, for in field working.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Our standard API offering provides users with access to create, retrieve and update information within the system. The API is provisioned as a web service with a set of documented methods providing the user with details of functionality available.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- ASSURE offers a suite of modules which can be purchased in any combination to suit the Local Authority. Styling is also customisable to match the Local Authorities colours, fonts and logos, and codes within the system can all be altered to match the required way of working
Scaling
- Independence of resources
- Each client within the NEC cloud service is allocated computer resources (processing power, memory and storage) in accordance with the number of users and documents to be stored. This is sized to enable users to undertake normal operational activities without affecting other users.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users will have direct access to their data via reporting methods, and the embedded reporting tool includes pre configured domains to assist with this. Alternatively, NEC can assist with data export for an additional charge.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Excel
- ODT
- RTF
- PPT
- DOCX
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- DOC
- JPEG
- PNG
- MP4
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- Private MPLS circuits or equivalent.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection within supplier network
- All data is encrypted at rest within the database.
Availability and resilience
- Guaranteed availability
- Service availability target is 99.5%. Where the service fails to reach this standard service credits and reimbursement of fees will be on a case by case basis.
- Approach to resilience
-
There are two areas of service resilience: data centre and support.
- Data centre
The data centre housing the ASSURE system is a purpose-built facility classified as Tier III+. It has separate mains power feeds from different supply lines, distributed through independent, duplicated distribution paths to each cabinet. It is designed to be fully resilient with redundant N+1 power and cooling. Services utilise highly redundant and resilient equipment, and virtual technology enables services to move to alternate hosts in the event of a host failure. Resilience is further boosted through resilient and multi-layered network infrastructure based on paired Cisco switch infrastructure. There is stringent security protection certified to ISO 27001:2013 standard. Production services located in the data centre are also protected through replication and disaster recovery services at a second data centre, providing data centre resilience.
- Support
Each contract is assessed for its workload requirements and capacity is built into the supporting technical teams. Specialist shared teams provide support services located from multiple locations enabling service resilience and cover for peaks in demand. Standards, such as ITIL and Service Desk, further contribute to service quality and resilience. - Outage reporting
- Outages will be treated as a Major Incident (MI) and managed by the ISO20000:2018 certified process. A named user will receive an email and SMS message notifying them of the status of the MI until resolution. The incident will also be logged on the Service Desk system where the status is also visible to the user.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Separate networks are used for users, and for support and management purposes. These are logically separated using vlans and firewalls. All management and support staff have access via the management network and end users are excluded.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 07/06/2021; valid until June 2024. Certificate IS 598449.
- What the ISO/IEC 27001 doesn’t cover
- N/A our ISO 27001 certification covers all our office location.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Cyber Essentials and Cyber Essentials Plus
- Business Continuity Management ISO22301:2019
- Environmental Management ISO14001:2015
- Information Security Management ISO27001:2013
- Service Management ISO20000:2018
- Quality Management ISO9001:2015
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The NEC Senior Information Risk Owner (SIRO) operates at board level and has overall responsibility and accountability for all aspect of security governance. The SIRO is supported by an Information Security Steering Group (ISSG) which is headed by the Security Director and has representatives from all areas within the organisation.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- NEC is certified for ISO20000:2018 for Service Management, which covers both our Configuration Management and Change Management processes. This is audited both internally by our Data Protection Officer (DPO) and Head of the Compliance, Risk and Audit team, and externally by the UKAS accredited audit body British Standards Institute, (BSI). NEC follows an ITIL-based approach, and the NEC service desk personnel have undergone the relevant ITIL qualifications for their roles. Our CMDB is updated accordingly throughout the lifetime of the asset, up to and including decommissioning and disposal.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- NEC has entered into security knowledge sharing partnerships to react to new and increasing threat levels. NEC are members of the NCSC Cyber Security Information Sharing Partnership (CiSP) for early identification and advice on security threats, incidents and solutions. The NEC InfoSec team subscribes to a number of key suppliers and cyber security websites, which send daily alerts on the latest vulnerabilities. NEC are members of the Cyber Network Reporting Service (CNR) that helps the NCSC to rapidly notify organisations that might be affected by malicious software.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- NEC implements a Security Information and Event Management (SIEM) system which provides alerts and reports that enable log sources to be processed in accordance with GPG13. Custom rules can be defined to detect and alert on suspicious behaviour. The InfoSec team reviews the SIEM alerts and reports on a daily basis to check for any anomalous behaviour. The NEC security monitoring policies and practices are aligned with incident management policies and practices. Any significant security issues identified will result in the NEC InfoSec team raising a security incident in the NEC service management system to initiate the detailed analysis process.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incident Management is part of our ISO27001:2022 certified Information Security Management system (ISMS). All incidents are handled within the same process. Users report incidents through the Service Desk, and a Security Incident is then raised on the ISMS. This is reviewed by the Security Team and is managed in accordance with the Security Incident Management Process. The security incident is kept updated, and once the Security Incident is closed a full report is produced which is used to identify any lessons learnt.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Public Services Network (PSN)
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
NEC is committed to being Net Zero by 2030.
To support this objective, we targeted a 50% reduction in our 2020 baseline emissions by 2026. We are ahead of target, having already achieved an independently audited reduction of 64% in tonnes of carbon dioxide equivalent(tC02e).
We have implemented a multitude of initiatives to support this, including:
-Appointing an Environmental Manager and Environmental Champions to promote our objectives.
-Successfully obtaining certification for and implementing ISO14001:2015 Environmental Management System(EMS).
-Developing a Carbon Reduction Plan, which is published on our website.
-Maintaining an Environmental Aspect and Impact Register (down to site level) through which to capture the elements of our operating practices that could negatively impact the environment.
-Working with government accredited consultants to understand our environmental impact.
-Collaborative activities to influence customers, supply chain partners and employees.
Specific initiatives applicable to our contract delivery approach include:
-Ensuring directly sourced energy is from renewable sources.
Reducing business travel where possible through utilisation of controls and technology such as:
-Video conferencing.
-Electronic sharing of documents.
-Conference call facilities.
-Working from home/flexible working arrangements.
-Approval controls for commercial flights.
-Use of environmentally friendly data centres.
Additionally, our Environmental Policy objectives include:
-Meeting all relevant legal requirements and monitoring our compliance.
-Minimising our environmental impacts for the life cycle (including disposal) of work equipment and other physical assets under our control.
-Demonstrating efficient use of energy, water, and other natural resources
-Maximising opportunities to minimise our waste by reusing or recycling waste, where practical.
-Ensuring our supply chain are aware of our environmental policy and our commitment to ensuring its effective implementation.
Increasing environmental awareness and commitment amongst employees through training and briefings.
We’ll continue to identify opportunities to improve our environmental performance through clear objectives, plans and targets.Covid-19 recovery
During the COVID-19 global health crisis, NEC supported its workforce, customers and the local communities they serve, to adapt to the challenges the pandemic posed. As a provider of software and services to the public sector, this included the rapid development and deployment of software solutions to enable the efficient and effective delivery of new government schemes and changes in legislation introduced as a direct response to the pandemic. Examples include provision of software to assist with Test and Trace Support Payments and new hospitality sector licensing requirements.
Initiatives we implemented that support the policy outcomes include:
• Increasing our pre-pandemic workforce numbers through recruitment of an additional 250 UK based roles, many of whom were unemployed following redundancy from other sectors such as hospitality.
• Re-training and redeploying temporarily displaced colleagues rather than imposing redundancies or taking advantage of the furlough scheme.
• Investing over £400,000 in training and apprenticeships.
• Working collaboratively with customers to introduce new ways of working.
• Delivering community based social value through donations in kind to voluntary sector organisations impacted by the pandemic.
As part of our response to the pandemic we invested in and introduced several initiatives and workplace adaptations to protect employee health and safety, including:
• Introducing wider use of remote and flexible working, including making additional allowances for those caring for young children.
• Enhancing office safety, including installing sanitising stations, hygiene screens and digital thermometers.
• Increasing the frequency of colleague communications, with a focus on provision of mental health support and reducing the risks of isolation/loneliness.
• Providing all employees with free access to additional specialist resources, including 24x7 counselling and mental health services.Tackling economic inequality
We recognise the expertise, innovation and value that can be gained from having a diverse supply chain and providing all suppliers with a fair and equal opportunity to become suppliers to us and our customers. We operate openly and transparently to enable this collaborating with third-party suppliers including large enterprises, sub-contractors, SMEs, VCSEs, mutuals and social enterprise organisations.
Additionally, we are committed to nurturing talent and creating a sustainable learning and development culture that equips our workforce with the appropriate skills, knowledge and processes so that the company continues to deliver innovative, industry leading solutions.
Processes and practices we have adopted to tackle economic inequality include:
• Using outcome-based specifications and co-design methods to encourage suppliers, communities, users and third sector organisations to collaborate and propose solutions based upon end user requirements, rather than being prescriptive.
• Advertising supply chain opportunities openly and always operating transparently.
• Including modules covering anti-bribery and corruption, whistleblowing, equality and diversity in our all-colleague compulsory Annual Compliance Training.
• Having policies and operating practices that support effective supply chain relationships through fair selection and responsible management. For example, only flowing down appropriate contract terms.
• Paying at least 95% of all invoices within agreed terms and agreeing to reduced payment terms for SMEs and subcontractors.
• Never deducting sums from payments as a charge for remaining on our supplier list.
• Investing in new jobs and training opportunities through an active Apprenticeship scheme. We recruited 18 apprentices in 2023.
• Creating opportunities for career progression and investing in reward and recognition initiatives that support employee retention.
• Following the foundational principles of the Good Work Plan in respect of employee satisfaction, fair pay, well-being and safety, career progression, voice, and autonomy.
• Having appropriate controls in place to mitigate cyber security risks.Equal opportunity
We want to be an employer of choice for people of all backgrounds and we are committed to ensuring workers either directly employed or employed within our supply chains are treated fairly, humanely, and equitably. We will not discriminate on grounds of gender, marital status, race, ethnic origin, colour, nationality, national origin, disability, sexual orientation, religion, age or any other characteristic.
To encourage a diverse and varied workforce our approach to equal opportunity includes:
-Inclusive and accessible recruitment practices, including supporting candidates and employees with disabilities through provision of supportive technology and/or changes to working practices.
-Collecting, analysing and senior reporting of equality and diversity data obtained during recruitment activities.
-Making appointments on the grounds of selecting the most suitable candidate for the post.
-Ensuring job adverts reach a diverse audience, including utilising job sites which encourage interest from disadvantaged and Minority Ethnic groups.
-Having diverse interview panels and anonymising applications.
-Using gender-neutral role definitions.
-Ensuring policies and employee communications promote respect and equality for all.
Other activities to support equal opportunity within the workforce include:
-Tackling the gender pay gap, through annual audits. Women now comprise 50% of our leadership team, including our Chief Executive.
-Compliance with the Modern Slavery Act 2015 and the nine core principles of the Ethical Trading Initiative Base Code.
-Ensuring effective supply chain controls are in place to mitigate and manage the risks of exploitation.
-Provision of appropriate channels for colleagues to have an effective voice, such as our Employee Steering Group.
-Investment in workforce development and training, including an active Apprenticeship programme.
-No use of zero hours contracts or fire and rehire practices.
-Being a Real Living Wage Employer.
-Flexible working practices.
-Transparent and structured promotion, pay and reward processes.
-Senior level sponsorship at board level to support and promote equal opportunity.Wellbeing
Our approach to supporting good health and wellbeing includes providing our workforce with:
• Access to helpful health and wellbeing resources through our dedicated intranet Wellness Hub.
• A LinkedIn Learning Platform that includes a section dedicated to health and wellbeing, including advice for managers on opening up dialogue about mental health and emotional safety.
• Free and confidential access to specialist resources 24x7, including counselling and mental health services through our Employee Assistance Programme.
• Private healthcare cover including a Doctor at Hand service for fast and convenient access to advice, assistance and medical treatment, anytime and anywhere.
• Maintaining compliance with the six standards of the Mental Health at Work commitment.
• Accommodating workplace adjustments, such as supportive technology for those with a disability or health condition.
• Encouraging good physical health by providing discounted corporate gym membership at over 3,300 participating gyms through our employee GymFlex scheme.
• Access to a cycle to work scheme through salary sacrifice.
Employee Communications
We incorporate national health and wellbeing campaigns within our yearly communications calendar to raise employee awareness and signpost to useful support pathways. Our 2024 calendar will include the following nationally recognised campaigns:
• Mental Health Awareness week.
• World Menopause Day.
• National Eye Health week.
• World Diabetes Day.
• Stress Awareness Month.
• Suicide Prevention Day.
• Men's Health week.
We have Mental Health First Aiders who are trained to spot the signs of mental ill health and can provide early support for colleagues who may be developing a mental health issue.
Policies
Support for employee health and wellbeing is underpinned by a policy framework including:
• Health and Safety Policy
• Alcohol, Drugs & Solvent Abuse Policy
• Menopause Policy
• Absence Policy
• Flexible Working Policy
• Gender Reassignment Policy.
Pricing
- Price
- £99.17 a user a month
- Discount for educational organisations
- No
- Free trial available
- No