Academy Learning Management System
Academy is an easy to use Learning Management System, it provides you and your project team with access to a suite of eLearning, ePortfolio, skills assessments, webinars and knowledge management tools.
It also contains tools to facilitate face-to-face training, monitoring, reporting analytics and development of role-based capability frameworks.
Features
- Hosted/SaaS LMS
- SCORM 1.2, SCORM 2004 v2nd, 3rd, 4th compliant
- API - for integration with other systems
- Certificates
- Accessible via Mac, PC, iPhone, iPad, Android
- Extensive course library
- Automatic and scheduled compliance reminders
- Extensive reporting/analytics, functional role-based curriculums, permissions and reporting
- Clean user experience gets learners to their content easily
- Surveys to evaluate content and learners experience
Benefits
- Bite size accredited courses that can be completed in 30mins
- Count towards CPD requirements for professional institutions
- Pre-configured learning paths curated to relevant roles within your organisation
- 800 courses covering contract management – NEC, JCT, FIDIC
- Accelerated programmes - upskill your teams in just 12 weeks
- CITB Levy release
- Courses authored by 200+ industry experts and practitioners
- No downloaded or installation required
- Retain staff and increase workforce productivity
Pricing
£5 to £25 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 9 1 4 5 4 1 2 0 6 6 3 4 7 2
Contact
Built Intelligence Ltd
Chris Corr
Telephone: 0117 214 0890
Email: enquiries-gcloud@builtintelligence.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- The platform can be integrated with ticket management systems, chat system and other third party system. Anything you see on our platform, can also done via an API call.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
-
All non-critical software updates occur outside normal office hours, usually between 9pm and 12am, all users will be warned on login about any impending updates. Critical maintenance may happen during office hours but this will happen if there is a functional issue with the system to all users. Online support is available via help pages, FAQ sections and training information.
For private/internal instances the client will need to supply details of the appropriate Private cloud service for hosting. - System requirements
-
- Internet Access (minimum 128kbps)
- Internet Browser (Latest version Internet Explorer/Edge, Firefox, Safari, Chrome etc)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support is email based and within UK office hours 9:00am to 5:00pm. We aim to respond within 1 working hour.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- We have not currently carried out any testing of assistive technology solutions with our web chat system but are waiting for confirmation from our supplier that this has been carried out.
- Onsite support
- Yes, at extra cost
- Support levels
- We provide telephone and email support free of charge to all our customers, on-site support requirements are negotiated on a per customer basis and charged at our standard day rate.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Organisation, your training and content requirements.
We can then train appropriate individuals in the management and support of the learning process and also provide general support on an ongoing basis.
Our support staff and development team are all UK based and available during office hours (8:30am to 5:30pm). - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- System specific Wiki (Separate User and Admin documentation)
- End-of-contract data extraction
- System data is stored as a MySQL database and as such can be exported and manipulated very easily into any suitable format using any modern database administration tool.
- End-of-contract process
- We can provide a data export of the system as part of our service. Any further assistance with data migration is costed on a per project basis according to our standard day rate.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- For standard users, functionality on the mobile version of the service is largely the same as that of the desktop version. There may be alteration to the layout and behaviour of certain elements of the system functionality.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
-
The service offers an API with CRUD access to key system data models.
Access to the API is provided through the use of an access token which needs to be issued to the service accessing the API externally. - Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- We have tested our system internally against the WCAG2.0 guidelines.
- API
- Yes
- What users can and can't do using the API
- The service offers an API with CRUD access to key system data models. Access to the API is provide through the use of an access token which needs to be issued to the service accessing the API externally.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The system can be configured and customised to a limited extent via the backend administration system. Further to this, the system is fully themable and can be extended through the use of the modular plugin architecture.
Scaling
- Independence of resources
-
Our choice of cloud hosting provider allows us to scale the hosting infrastructure according to site traffic with very little notice.
In addition, larger scale changes in system capacity can be provided for by moving to a load-balanced distributed architecture.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Various metrics are available through Analytics and Insights, which include completion statistics, usage metrics, unique users, course enrolments and these can be easily exported in csv or pdf.
Recurring reports can also be scheduled to be received via email. - Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- We can provide a data export of the system as part of our service. Any further assistance with data migration is costed on a per project basis according to our standard day rate.
- Data export formats
-
- CSV
- Other
- Other data export formats
- MySQL
- Data import formats
-
- CSV
- Other
- Other data import formats
- MySQL
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Follow key processes to support resilience - Incident response plans, backup and recovery plans, vendor assessments, and Risk management.
These plans include taking daily snapshots (backups) and near-real-time replicating data to a separate, geographically isolated location within the customer's region. Because Bridge uses the world leader in Infrastructure as a Service (IaaS), Amazon Web Services (AWS) to host data in the customer's geographical region, each region has multiple, isolated locations known as Availability Zones where customer data is replicated for disaster recovery purposes. The use of multiple AWS Availability Zones is to ensure that if there is a
failure in one physical location, the data is readily available in another geographically separate location
Guaranteed availability We contractually guarantee 99.5% availability apart from for scheduled maintenance downtime which are carried out outside normal working hours.
Any failures to meet this level of availability will result in service credits awarded to to the customer. - Approach to resilience
- Available on request
- Outage reporting
- We have a 3rd party monitoring service in place on top of the standard monitoring offered by our cloud hosting supplier. It provides a dashboard, API and alerts via SMS and email.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- Access to the management console of the application is managed through the application itself and can be further limited via a 3rd party authentication service to include limits such as IP, location and use of a hardware key or multi-factor authentication app.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus
- ISO/IEC 27001 accreditation date
- 31/05/2022
- What the ISO/IEC 27001 doesn’t cover
- Nothing is excluded, it covers all business operations.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
-
We take information security very seriously and understand how important it is to our clients. Our choice of infrastructure and software tools reflect this. We are accredited under the Cyber Essentials Scheme (http://www.cyberessentials.org).
Information security policies and processes - Information security policies and processes
- We are implementing GDPR best practice and training staff to ensure compliance.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All of our code is managed using a Version Control System and changes are tracked via a ticketing system where we prioritise and manage tickets.
Any updates to the production environment are tested prior to deployment to live using a dedicated test environment.
All hosting environments include incremental backups which supports both short term and long term roll back of the code and database. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- 3rd party conducts both internal vulnerability scans and external security audits and penetration testing to monitor for vulnerabilities. If any vulnerabilities are detected, 3rd party security and engineering teams work together to analyse, design, and develop the required patch and update security protocols accordingly.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Sservice is hosted on the state-of-the-technology cloud infrastructure provided by Amazon Web Services (AWS). The AWS
infrastructure is highly stable, fault-tolerant, and secure For additional information about AWS’ security program, certifications and
standards compliance, please refer to http://aws.amazon.com/security and http://aws.amazon.com/compliance/. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Implementation of a comprehensive set of security technologies, management and review policies, monitoring operations, and enforcement procedures to ensure that our system and data security meets or exceeds governmental statutes and regulations, industry standards, and institutional requirements. No organisation is impenetrable and, accordingly, prepared plans to help most effectively facilitate a security incident.
A detailed summary of Incident Response Policy and Plan as it relates to security incidents is available in a white paper on request. Additional details regarding our procedures and plans in the event of system downtime is further documented in the Disaster Recovery white paper.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Other
- Other public sector networks
-
- Auth0
- SAML Authentication
- Social logins
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Built Intelligence are strong supporters of social value and sustainability and are committed to:-
• An inclusive and supportive workplace culture
• Raising the living standards of local residents
• Promoting Local Skills and Employment
• Promoting equality, fairness, diversity and inclusion
• Improving staff wellbeing
• Building capacity and sustainability of the Voluntary and Community Sector (VCSE) and local MSME base
• Environmental sustainability
We are also aware of the broader social, environmental and economic impact of our behaviours and actions, and strive to optimise our social value, maximising the positive impact on the communities and areas in which we work.
Here are some examples:
• We only source ethical, responsible suppliers through a robust due diligence process,
• We are committed to reducing our environmental impact, through adopting a ‘reduce, reuse, recycle’ approach and by investing in green technologies and the other measured outlined in question 8,
• Maximise the use of digital technologies and best working practice to minimise the number of face-to-face meetings and reduce non-essential travel working around customers’ needs,
• Investigate ways to reduce our carbon footprint and energy and water consumption through a continuous improvement process, and
• Promote environmental sustainability to our staff and users base with several webinars on topical such as:-
o Climate Change Litigation and Corporate Responsibility
o Climate Change and the UK Construction Industry
o Climate-related reporting: Is your business ready?
o Climate-related reporting: 3 common barriers and how to overcome them
o How can Public Procurement Help Deliver Social Value?Covid-19 recovery
Built Intelligence are strong supporters of social value and sustainability and are committed to:-
• An inclusive and supportive workplace culture
• Raising the living standards of local residents
• Promoting Local Skills and Employment
• Promoting equality, fairness, diversity and inclusion
• Improving staff wellbeing
• Building capacity and sustainability of the Voluntary and Community Sector (VCSE) and local MSME base
• Environmental sustainability
We are also aware of the broader social, environmental and economic impact of our behaviours and actions, and strive to optimise our social value, maximising the positive impact on the communities and areas in which we work.
Here are some examples:
• We invest in talent, providing a suite of over 800+ technical training courses and learning opportunities and resources to help retain staff and grow their skills,
• Allowing people impacted by the COVID-19 pandemic to move to a high growth sector,
• Give chances for people from these backgrounds to gain skills, qualifications and career advancement, and
• Provide high quality employment conditions, in line with the Good Work Plan.Tackling economic inequality
Built Intelligence are strong supporters of social value and sustainability and are committed to:-
• An inclusive and supportive workplace culture
• Raising the living standards of local residents
• Promoting Local Skills and Employment
• Promoting equality, fairness, diversity and inclusion
• Improving staff wellbeing
• Building capacity and sustainability of the Voluntary and Community Sector (VCSE) and local MSME base
• Environmental sustainability
We are also aware of the broader social, environmental and economic impact of our behaviours and actions, and strive to optimise our social value, maximising the positive impact on the communities and areas in which we work.
Here are some examples:
• We employ apprentices, recruit locally and try to maximise any spend through our local MSME and VCSE base and create opportunities for those from underrepresented groups in high quality employment in technology, construction and elsewhere, such as those from deprived areas, women, and people from ethnic minority backgrounds,
• Advertising the positions on specialist job sites, such as Evenbreak for people with disabilities and Women into Construction,
• Engaging with Job Centre Plus facilities in economically deprived postcodes,
• Following best practice to make selection and interviews as accessible as possible, and
• Our ‘flexible and hybrid working” policy means our positions are highly accessible to those with disabilities and from deprived areas.Equal opportunity
Built Intelligence are strong supporters of social value and sustainability and are committed to:-
• An inclusive and supportive workplace culture
• Raising the living standards of local residents
• Promoting Local Skills and Employment
• Promoting equality, fairness, diversity and inclusion
• Improving staff wellbeing
• Building capacity and sustainability of the Voluntary and Community Sector (VCSE) and local MSME base
• Environmental sustainability
We are also aware of the broader social, environmental and economic impact of our behaviours and actions, and strive to optimise our social value, maximising the positive impact on the communities and areas in which we work.
Here are some examples:
• We employ apprentices, recruit locally and try to maximise any spend through our local MSME and VCSE base and create opportunities for those from underrepresented groups in high quality employment in technology, construction and elsewhere, such as those from deprived areas, women, and people from ethnic minority backgrounds,
• Advertising the positions on specialist job sites, such as Evenbreak for people with disabilities and Women into Construction,
• Engaging with Job Centre Plus facilities in economically deprived postcodes,
• Following best practice to make selection and interviews as accessible as possible, and
• Our ‘flexible and hybrid working” policy means our positions are highly accessible to those with disabilities and from deprived areas.Wellbeing
Built Intelligence are strong supporters of social value and sustainability and are committed to:-
• An inclusive and supportive workplace culture
• Raising the living standards of local residents
• Promoting Local Skills and Employment
• Promoting equality, fairness, diversity and inclusion
• Improving staff wellbeing
• Building capacity and sustainability of the Voluntary and Community Sector (VCSE) and local MSME base
• Environmental sustainability
We are also aware of the broader social, environmental and economic impact of our behaviours and actions, and strive to optimise our social value, maximising the positive impact on the communities and areas in which we work.
Here are some examples:
• We fundraise and have a partner charity, Lighthouse Charity that are committed to supporting the emotional, financial and physical well-being of construction workers and their families, ans
• Improve health, wellbeing and support for staff by providing support and resources on mental health, dedicated well-being days and encouraging staff to focus on their physical health by setting up a cycle to work scheme.
Pricing
- Price
- £5 to £25 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A library of free courses, webinars, check lists and templates are available from our Academy website.