DataSpace Development Control Office
Development Control – A complete back office solution from Planning Portal Integration, Application Validation, Consultation, public access, including redaction and instant publishing. The system has extensive workflow and team management facilities, along with Constraints management and Stat/Non Stat consultation and extensive reporting.
Features
- Development Control Case Management
- Fully integrated Public facing Public Access consultation
- Full and configurable GIS Integration
- Neighbour List Creation/Management
- Financial, Payment and Payment Chasing and reporting
- Integrated Workflow, and workgroup management
- Officer Report Creation Environment
- Constraints Handling
- Standard Document Creation and Completion and Sharing
- Optional CIL, Section 106, Land charges
Benefits
- Actively manage all aspects of the planning process
- Reduce administration with auto-consul tee comment recording
- Record all Planning Related Meta-data and extract for KPI's
- Manage fees, payments, credits/debits and chasing fees.
- Auto-extract a full range of PP data including plotted boundaries
- Auto-Extract Stat and Non-Stat consultees based on Constraints
- Manage all email correspondence automatically including automated completion of outbound/inbound
- Track all consultee, neighbour and street notice comments automatically
- Manage storage, viewing, markup, creation, updating /sharing of application documents
- Reduce Officer Report creation time with fast report environment.
Pricing
£600.00 a user
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 9 7 0 0 0 7 3 9 6 2 0 1 9 5
Contact
Resolution Data Management
Tony James
Telephone: 07976797984
Email: tony.james@resolutiondm.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Modules can be used as an add on to any traditional Building Control back office solution
- Cloud deployment model
-
- Public cloud
- Hybrid cloud
- Service constraints
- Maintenance is carried out where possible between 12am and 4am
- System requirements
- All hosted by us
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We aim for a response within minutes but definitely within 8 hours, Monday to Friday. Priority is given by the support team dependent on impact of the problem on the clients business
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support is part of the annual subscription. It covers phone and email support. Where a support agent deems it would be a better route they may offer a teams session to provide better support. Where there is clearly a major deficit in the users knowledge, the support agent may ask that the user orders more training.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide a complete on-boarding service, including consultation, training onsite or online.
Consultation provides a full investigation into existing data sources and the best way to onboard the data and configuration. The consultant will have a detailed understanding of building control procedures and operating standard rules. - Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- An online help hub with video tutorials
- End-of-contract data extraction
- Users can export the meta-data directly themselves, but included is a single tier export for application and documents, however it is advised that a bespoke export should be adopted to allow the greatest business intelligence and continuity.
- End-of-contract process
- A standard single tier export will be provided and made available as a secure FTP download. However a full service to prepare data in a suitable way to suit whatever the recipient system is will be offered at additional cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The screen will vary in layout when accessed on a smaller screened device, but functionality is the same
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Yes, it is only accessible by users who have had Super Admin training
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- Internal
- API
- Yes
- What users can and can't do using the API
-
Application download API
BMI System Interface such as Power BI for hybrid reporting function - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
There is a full System administration tool, which allows extensive customization for:
1. Meta-data
2. Workflow
3. Standard documents
4. Web forms and configuration
5. Users and Security
6. Certifications
7. Reports
8. Plan-Checking
9. Standard Notes
10. Comment Categories
11. Status Updates
and much, much more
Scaling
- Independence of resources
- The system is designed to minimize the impact of other users load on the system.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- There are meta-data exporting tools in the reporting engine. A single tier export is also provided as part of the service, which provides csv style output. Documents are provided to secure ftp site for download.
- Data export formats
- CSV
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XML
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Our system is designed for total availability and is hosted across multiple servers in a constantly updated VM-Ware environment which is not dependent on small hardware resilience.
We have no SLA arrangement, but promise a best efforts arrangement that has resulted in our service being unavailable for less than 2 business hours in the last 5 years - Approach to resilience
- The service is hosted in a managed virtual server environment, in a VM-Ware setup which is not dependent on physical hardware resilience. It is hosted only on UK and highly certified data-centres.
- Outage reporting
- A public dashboard
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Any management access has to be approved by a lead contact defined at the start of the contract. No security enhancements will be provided without written authorisation of this individual. Depending on the level requested a policy is in place to also make phone contact on top of an email approval. Anyone accessing the management interface will not be approved unless management interface training has been done.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Nqa
- ISO/IEC 27001 accreditation date
- 24/01/2024
- What the ISO/IEC 27001 doesn’t cover
- The complete solution is hosted in this environment
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 28/10/2022
- CSA STAR certification level
- Level 4: CSA C-STAR Assessment
- What the CSA STAR doesn’t cover
- The whole solution is in this environment
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- PCI-DSS Site Display Certificate
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Most of our security principles are adopted from our hosting provider. Data storage and accessibility criteria are approved at board level and any variation has to be approved at that level.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Any software changes are tested internally using a sandbox account to assess security and functionality issues. Upon successful internal testing a subscribed beta set of clients assess the updates functionality and suitability criteria. The majority of updates are within the logged in environment and are typically user interface changes.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Maintenance of the actual server environment is maintained to the highest standards by our G-Cloud approved supplier. Security patches and indeed all OS updated are applied as soon as they become available during the hours of 2am to 4am. Our hosting provider provides most details, along with subscriptions to third party security websites that provide details of recently exposed vulnerabilities.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- This service is provided by our hosted Cloud Service provider who is G-Cloud approved
- Incident management type
- Supplier-defined controls
- Incident management approach
- This is defined by our G-Cloud approved supplier
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Our service provides a great reduction in the requirement for people to work from an office through online system availability, reducing emissions. The system also works to reduce the usage of paper, printing, and other physical activities, including reducing travel arrangements/distances for site visits.
Pricing
- Price
- £600.00 a user
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- This is by prior arrangement and is dependent on taking some paid for training. It would also be time limited, and may only be used for assessment purposes.