Skip to main content

Help us improve the Digital Marketplace - send your feedback

NEC SOFTWARE SOLUTIONS UK LIMITED

Origin Resource Management

A comprehensive resource management system, designed for the modern requirements of UK Policing. It allows resource managers and duty planners to ensure that they have the right number of people, with the right skills and training, in the right place at the right time; providing real-time management and operational data.

Features

  • Duties management
  • Time management (Absence, Sickness, Overtime).
  • Training administration
  • Performance Review & Development
  • Health & safety reporting
  • National police systems integration (Chronicle, DutySheet, College Learn, NPoCC)
  • Integration with force systems, Payroll, Finance, Expenses
  • BI Reporting
  • Dashboards
  • Workflow Management

Benefits

  • Automates time-consuming manual tasks: overtime claims, leave booking
  • Enables cost-effective, optimisation of resources
  • Aids procedures and morale
  • Access to up-to-date skills and resource data means better decision-making
  • Containment of overtime spend, fully auditable claims and cuts fraud
  • Focuses tactical and operational planning
  • Helps organisations to meet demand and ensure minimum cover levels.
  • Ensures correct deployment of officers with required up-to-date accreditations.
  • Excellent at responding to demands
  • Integrated information at your fingertips

Pricing

£5 to £16 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at frameworks@necsws.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 8 8 8 7 4 3 8 8 0 6 7 9 8 3

Contact

NEC SOFTWARE SOLUTIONS UK LIMITED NEC Frameworks Team
Telephone: 07852 936231
Email: frameworks@necsws.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
The service implements a standard set of business processes. The customer can configure processes themselves or NEC can supply this as additional services.

This will typically be at least one software version upgrade per year.
System requirements
  • Deployed on Microsoft Windows
  • Utilises Oracle EBS
  • Utilises Oracle Database
  • Utilises Oracle WebLogic Application Server
  • Utilises Oracle Internet Developer Suite
  • Utilises Oracle Identity and Access Management
  • Requires a back-end server stack that can be virtualised
  • Utilises local and/or wide area networks

User support

Email or online ticketing support
Email or online ticketing
Support response times
We provide 24/7/365 support or any variant required by the customer. Response times can be selected based on the severity of the fault. We can provide different service levels dependant on the SLA targets the customer requires.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
We provide a 24x7 application support based on a standard set of response targets for different incident priorities. Support includes application patches and new application releases on an annual basis.

Priority1–Critical - A critical problem needing immediate attention affecting a large number of staff (Whole department or business function). Loss of functionality such that one or more modules of the Origin Application cannot be used by any user.

Response Time - 1 hour. Resolution Target - 100% within 24 hours

Priority2-Significant. A serious problem where significant and critical features are unavailable with highly manual or no suitable workaround. Affecting an entire business function or more than 25% of users.

Response Time – 5 hours. Resolution Target - 90% within 5days 100% within 30days.

Priority3–Moderate. Less significant features affected with no suitable workaround. Less than 25% of users affected, system remains functional for 95% of users.

Response Time – 16hours. Resolution Target - 65% within 15days 75% with 30days 90% within 60days 100% within 90days.

Priority4–Low. Not urgent, no impact issue, cosmetic product fault.

Response Time – 5days. Resolution Target - 75% within 30days.

100% within 180 days

Support is overseen by a Service Delivery Manager includes regular service review meetings.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
The on–boarding process is managed via an implementation plan agreed with the customer at contract stage which is charged for separately and is dependent on the level of involvement required on behalf of NEC.

Provided in addition to the standard service, the customer may receive system training for trainers and system administrators, so they are able to system test the service, and configure it to meet their business requirements and processes. The training is also charged for separately.

The off-boarding process must be initiated via a request to the NEC Service Desk at least one month before the desired exit date. NEC will agree an off-boarding plan with the Client detailing the tasks, responsibilities and timescales. As standard the off-boarding process will include a standard data extract taken and passed securely back to the customer and/or controlled data destruction of the data that has been held on the system. All customer user accounts will also be removed from the service.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
  • Online training
  • Presentation materials
  • Videos
End-of-contract data extraction
As standard the off-boarding process will include a standard data extract taken and passed securely back to the customer and/or controlled data destruction of the data that has been held on the system. All customer user accounts will also be removed from the service.
End-of-contract process
The off-boarding process must be initiated via a request to the NEC Service Desk at least one month before the desired exit date. NEC will agree an off-boarding plan with the Client detailing the tasks, responsibilities and timescales.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The mobile service has been designed for end user rather than administrators. Hence the functionality provided is limited to that user focus. As an example – Self Service functions such as Book On and Book Off, leave balances and duties information are available to the end user.
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Origin has specific API interfaces for existing force systems including Chronicle, DutySheet, College Learn and NPoCC. There is also the possibility using our RESTful API interface and an Open Standards based (J2EE, XML, SOAP) data exchange middleware module, which includes a number of engagement models including a Web Service capable of migrating data in and out of the service from a wide range of external locations and formats.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The Origin system is highly configurable and customisable depending on the needs of the customer. During the planning phase we engage with customers’ to understand their specific needs and ensure the product is tailored towards providing the maximum functionality, efficiencies and benefits.

Scaling

Independence of resources
The Origin system is scaled at implementation to be as flexible and capable as the demands of the organisation require.

Analytics

Service usage metrics
Yes
Metrics types
Origin has a comprehensive system for producing service metrics and business analytics. Orbit Analytics which can be included delivers a fast, flexible BI, reporting and analytics solution, with world-class dashboards and self-service capability.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Other
Other data at rest protection approach
We have adopted the NCSC Cloud Security Principals as the framework to securely deliver our cloud-based solutions. Data centres are extensively accredited, along with the remote support solution which is accessed via our Police Assured Secure Facility premises. Sensitive data at rest is secured using full disk encryption. Database Transparent Data Encryption is available as an option. Our ISO 27001 accredited controls along with our implemented NCSC Cloud Security Principals meet the criteria of CSA CCM v3.0.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The standard data extract (included in the service price) generated during the off-boarding process comprises an unrestricted (all records) extract of user data in XML form via the Standard DSL Query Services. Variations e.g. filters/extensions/transformations to the standard data extract can be commissioned from NEC by the Client as additional services if required. Data can also be exported in life in various features and functions within the system.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • PDF
  • XLS
Data import formats
Other
Other data import formats
XML

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks
We have adopted the NCSC Cloud Security principals and deploy our solutions in compliance with the principals, including the recommended profiles for encryption protocols and ciphers both at the application and network layers thus ensuring data transiting trusted zones is protected. Network demarcation points are protected with firewalls which can be either physical or virtual dependent on solution parameters.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
We utilise NCSC recommended profiles for both application and network layer protocols and encryption ciphers. Data within a network is secured using NCSC recommended profiles for TLS1.2 whilst data traversing network boundaries is secured with NCSC recommended profiles for VPN traffic (currently IKEv2).

Availability and resilience

Guaranteed availability
The availability target of the service is 99.9% per month excluding planned downtime or downtime outside of NEC’s control.
Approach to resilience
This information is available on request.
Outage reporting
NEC utilises multiple tools to provide monitoring for cloud infrastructure and application-level monitoring.  They provide a single User interface to give you full access to all the information support teams require to monitor and support production systems.  The easy to use, graphical interface gives up to date, critical information to ensure any system issues (infrastructure or application) are highlighted to ensure fast problem identification and resolution.

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
The default Authentication Scheme for the service is application username and password which is managed by the service’s own Identity and Access Management suite. Once authenticated a session cookie is allocated which enables single sign-on access to modules with the application security domain. Alternative configurations are available to support identity federation and trust relationships between the application security domain and a customer’s domain e.g. on-premise Microsoft Active Directory or Cloud Entra ID.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
07/06/2021; valid until June 2024. Certificate IS 598449.
What the ISO/IEC 27001 doesn’t cover
N/A, our ISO 27001 certification covers all our office locations.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • Cyber Essentials and Cyber Essentials Plus
  • Business Continuity Management ISO22301:2019
  • Environmental Management ISO14001:2015
  • Information Security Management ISO27001:2013
  • Service Management ISO20000:2018
  • Quality Management ISO9001:2015

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have a mature ISO 27001 ISMS with multiple security policies and processes which are designed to enforce the ISO 27001 controls throughout our business. Our policies include the onboarding of staff and vetting through supply chain security management to secure development framework and technical controls to deliver our solutions.

All staff are encouraged to report security issues in an open and honest culture. Security issues can be reported via several methods and are regularly reviewed by our Information Security Team reporting to our Head of Security. The Head of Security is a member of the Senior Management Team, reporting directly to the board. We hold regular Information Security Steering Group meetings at board-level.

We ensure policies are followed and adhered to by the use of regular internal and independent external accreditor ISO 27001 audits. Complying with company policy is an employee contractual obligation with failure leading to disciplinary processes and potential cessation of employment.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
NEC is certified for ISO20000:2018 for Service Management, which covers both our Configuration Management and Change Management processes. This is audited both internally by our Data Protection Officer (DPO) and Head of the Compliance, Risk and Audit team, and externally by the UKAS accredited audit body British Standards Institute, (BSI). NEC follows an ITIL-based approach, and the NEC service desk personnel have undergone the relevant ITIL qualifications for their roles. Our CMDB is updated accordingly throughout the lifetime of the asset, up to and including decommissioning and disposal.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Vulnerability assessment is automated via tooling such as Veracode or Nessus and manually through our Information Security Team based on knowledge gained from sources listed in the 3rd paragraph of this response.

We endeavour to deploy third-party security patches within fourteen days from vendor release, subject to passing assurance testing.

We are registered with the NCSC CISP and take feeds from Trend ASRM with MISP threat intelligence feeding directly into our firewalls. Furthermore, we are registered with many vendors for security alerts and actively monitor public announcement services, for example: NIST NVD, Mitre, CISA.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Identification of potential compromise is performed by dedicated tooling with the hosting platform.

Our ISO 27001 accredited Security Incident Management Standard details the proportionate steps to be taken to respond to any compromise, be that potential or actual. The standard provides an effective method of responding to security incidents and contains guidance for rapidly detecting incidents; minimising loss or destruction; mitigating weaknesses that were exploited; restoring services and reducing the risk from future incidents.

We respond immediately upon an incident being reported to confirm the incident and subsequently follow the processes detailed in our aforementioned standard.
Incident management type
Supplier-defined controls
Incident management approach
Incident Management is part of our ISO20000:2018 certified Service Management system.

All incidents are handled within the same process. Users report incidents through the Service Desk, and a Security Incident document is then raised. This is reviewed by the Security Team and is managed in accordance with the Incident Management Process.

At regular times Incident Reports are provided to the user, and once the Incident is closed a full report is produced which is used to identify any lessons learnt.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
Police National Network (PNN)

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

NEC is committed to being Net Zero by 2030.
To support this objective, we targeted a 50% reduction in our 2020 baseline emissions by 2026. We are ahead of target, having already achieved an independently audited reduction of 64% in tonnes of carbon dioxide equivalent(tC02e).
We have implemented a multitude of initiatives to support this, including:
-Appointing an Environmental Manager and Environmental Champions to promote our objectives.
-Successfully obtaining certification for and implementing ISO14001:2015 Environmental Management System(EMS).
-Developing a Carbon Reduction Plan, which is published on our website.
-Maintaining an Environmental Aspect and Impact Register (down to site level) through which to capture the elements of our operating practices that could negatively impact the environment.
-Working with government accredited consultants to understand our environmental impact.
-Collaborative activities to influence customers, supply chain partners and employees.
Specific initiatives applicable to our contract delivery approach include:
-Ensuring directly sourced energy is from renewable sources.
Reducing business travel where possible through utilisation of controls and technology such as:
-Video conferencing.
-Electronic sharing of documents.
-Conference call facilities.
-Working from home/flexible working arrangements.
-Approval controls for commercial flights.
-Use of environmentally friendly data centres.
Additionally, our Environmental Policy objectives include:
-Meeting all relevant legal requirements and monitoring our compliance.
-Minimising our environmental impacts for the life cycle (including disposal) of work equipment and other physical assets under our control.
-Demonstrating efficient use of energy, water, and other natural resources
-Maximising opportunities to minimise our waste by reusing or recycling waste, where practical.
-Ensuring our supply chain are aware of our environmental policy and our commitment to ensuring its effective implementation.
Increasing environmental awareness and commitment amongst employees through training and briefings.
We’ll continue to identify opportunities to improve our environmental performance through clear objectives, plans and targets.

Covid-19 recovery

During the COVID-19 global health crisis, NEC supported its workforce, customers and the local communities they serve, to adapt to the challenges the pandemic posed. As a provider of software and services to the public sector, this included the rapid development and deployment of software solutions to enable the efficient and effective delivery of new government schemes and changes in legislation introduced as a direct response to the pandemic. Examples include provision of software to assist with Test and Trace Support Payments and new hospitality sector licensing requirements.
Initiatives we implemented that support the policy outcomes include:
• Increasing our pre-pandemic workforce numbers through recruitment of an additional 250 UK based roles, many of whom were unemployed following redundancy from other sectors such as hospitality.
• Re-training and redeploying temporarily displaced colleagues rather than imposing redundancies or taking advantage of the furlough scheme.
• Investing over £400,000 in training and apprenticeships.
• Working collaboratively with customers to introduce new ways of working.
• Delivering community based social value through donations in kind to voluntary sector organisations impacted by the pandemic.
As part of our response to the pandemic we invested in and introduced several initiatives and workplace adaptations to protect employee health and safety, including:
• Introducing wider use of remote and flexible working, including making additional allowances for those caring for young children.
• Enhancing office safety, including installing sanitising stations, hygiene screens and digital thermometers.
• Increasing the frequency of colleague communications, with a focus on provision of mental health support and reducing the risks of isolation/loneliness.
• Providing all employees with free access to additional specialist resources, including 24x7 counselling and mental health services.

Tackling economic inequality

We recognise the expertise, innovation and value that can be gained from having a diverse supply chain and providing all suppliers with a fair and equal opportunity to become suppliers to us and our customers. We operate openly and transparently to enable this collaborating with third-party suppliers including large enterprises, sub-contractors, SMEs, VCSEs, mutuals and social enterprise organisations.
Additionally, we are committed to nurturing talent and creating a sustainable learning and development culture that equips our workforce with the appropriate skills, knowledge and processes so that the company continues to deliver innovative, industry leading solutions.
Processes and practices we have adopted to tackle economic inequality include:
• Using outcome-based specifications and co-design methods to encourage suppliers, communities, users and third sector organisations to collaborate and propose solutions based upon end user requirements, rather than being prescriptive.
• Advertising supply chain opportunities openly and always operating transparently.
• Including modules covering anti-bribery and corruption, whistleblowing, equality and diversity in our all-colleague compulsory Annual Compliance Training.
• Having policies and operating practices that support effective supply chain relationships through fair selection and responsible management. For example, only flowing down appropriate contract terms.
• Paying at least 95% of all invoices within agreed terms and agreeing to reduced payment terms for SMEs and subcontractors.
• Never deducting sums from payments as a charge for remaining on our supplier list.
• Investing in new jobs and training opportunities through an active Apprenticeship scheme. We recruited 18 apprentices in 2023.
• Creating opportunities for career progression and investing in reward and recognition initiatives that support employee retention.
• Following the foundational principles of the Good Work Plan in respect of employee satisfaction, fair pay, well-being and safety, career progression, voice, and autonomy.
• Having appropriate controls in place to mitigate cyber security risks.

Equal opportunity

We want to be an employer of choice for people of all backgrounds and we are committed to ensuring workers either directly employed or employed within our supply chains are treated fairly, humanely, and equitably. We will not discriminate on grounds of gender, marital status, race, ethnic origin, colour, nationality, national origin, disability, sexual orientation, religion, age or any other characteristic.
To encourage a diverse and varied workforce our approach to equal opportunity includes:
-Inclusive and accessible recruitment practices, including supporting candidates and employees with disabilities through provision of supportive technology and/or changes to working practices.
-Collecting, analysing and senior reporting of equality and diversity data obtained during recruitment activities.
-Making appointments on the grounds of selecting the most suitable candidate for the post.
-Ensuring job adverts reach a diverse audience, including utilising job sites which encourage interest from disadvantaged and Minority Ethnic groups.
-Having diverse interview panels and anonymising applications.
-Using gender-neutral role definitions.
-Ensuring policies and employee communications promote respect and equality for all.
Other activities to support equal opportunity within the workforce include:
-Tackling the gender pay gap, through annual audits. Women now comprise 50% of our leadership team, including our Chief Executive.
-Compliance with the Modern Slavery Act 2015 and the nine core principles of the Ethical Trading Initiative Base Code.
-Ensuring effective supply chain controls are in place to mitigate and manage the risks of exploitation.
-Provision of appropriate channels for colleagues to have an effective voice, such as our Employee Steering Group.
-Investment in workforce development and training, including an active Apprenticeship programme.
-No use of zero hours contracts or fire and rehire practices.
-Being a Real Living Wage Employer.
-Flexible working practices.
-Transparent and structured promotion, pay and reward processes.
-Senior level sponsorship at board level to support and promote equal opportunity.

Wellbeing

Our approach to supporting good health and wellbeing includes providing our workforce with:
• Access to helpful health and wellbeing resources through our dedicated intranet Wellness Hub.
• A LinkedIn Learning Platform that includes a section dedicated to health and wellbeing, including advice for managers on opening up dialogue about mental health and emotional safety.
• Free and confidential access to specialist resources 24x7, including counselling and mental health services through our Employee Assistance Programme.
• Private healthcare cover including a Doctor at Hand service for fast and convenient access to advice, assistance and medical treatment, anytime and anywhere.
• Maintaining compliance with the six standards of the Mental Health at Work commitment.
• Accommodating workplace adjustments, such as supportive technology for those with a disability or health condition.
• Encouraging good physical health by providing discounted corporate gym membership at over 3,300 participating gyms through our employee GymFlex scheme.
• Access to a cycle to work scheme through salary sacrifice.
Employee Communications
We incorporate national health and wellbeing campaigns within our yearly communications calendar to raise employee awareness and signpost to useful support pathways. Our 2024 calendar will include the following nationally recognised campaigns:
• Mental Health Awareness week.
• World Menopause Day.
• National Eye Health week.
• World Diabetes Day.
• Stress Awareness Month.
• Suicide Prevention Day.
• Men's Health week.
We have Mental Health First Aiders who are trained to spot the signs of mental ill health and can provide early support for colleagues who may be developing a mental health issue.
Policies
Support for employee health and wellbeing is underpinned by a policy framework including:
• Health and Safety Policy
• Alcohol, Drugs & Solvent Abuse Policy
• Menopause Policy
• Absence Policy
• Flexible Working Policy
• Gender Reassignment Policy.

Pricing

Price
£5 to £16 a user a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at frameworks@necsws.com. Tell them what format you need. It will help if you say what assistive technology you use.