AssessNET Permit To Work Module
AssessNET’s Permit To Work Module will empower you to create bespoke Permit templates and authorisation process. Live permit status dashboards with task management alerts with document record management.
Features
- Fully customisable Permit templates, download as PDFs and print off
- Facilitates both 1-Step and 2-Step Permit authorisation
- Full export and download tools, Permit document history, audit trail
- Live Dashboard gives real-time visibility of Permit status
- Federation services (single sign-on)
- Custom API services
- UKAS Accredited ISO 27001, ISO 9001 and BS OHSAS 18001
- Riskex Health and Safety Consultancy and Training services available
Benefits
- Create entirely bespoke templates
- Enables download and export of any permits in PDF format
- System notification to relevant user once PTW initiated
- Generate statistical analysis of recorded data
- Each PTW has its own document history attached
- Dashboard area feeds real-time PTW information to authorised managers
- Automatically archives Permits once they expire
- Free Upgrades
Pricing
£9,995 an instance a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at Sales@riskex.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 13
Service ID
3 9 8 3 5 8 8 2 0 9 7 4 5 1 0
Contact
Riskex Ltd
Linda Kemp
Telephone: +44 1908 915272
Email: Sales@riskex.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Not Applicable
- System requirements
-
- IE11 or above
- Internet Connectivity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Next business working day
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We have a standard support level for all clients, regardless of business or contract size. A dedicated support team are on hand during normal business hours to answer and resolve any queries users may have.
Our service can be configured to restrict support requests to a clients dedicated support desk, if required.
All clients are allocated an account manager who is available to assist with any resolutions required.
Our service guarantees a 99.9% uptime per calendar month, allowing for scheduled maintenance to take place. All maintenance takes place outside of normal office hours, with appropriate notice given. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
All on-boarding clients are allocated an account manager and implementation manager who will ensure the smooth transition onto the service. An initial implementation meeting will be scheduled to ensure that our team understand your requirements.
Our team will work with you to capture the core data required by the system. A standard administrative training session will take place to educate the key stakeholders in the management of the service.
Training provision can be either onsite or online, or a combination of both. Our team will work with you to tailor training sessions to your requirements, covering train-the-trainer sessions; specific modules; or more general system overviews. As peoples diaries can be busy, we can re-run sessions to different teams, or for a small fee produce a dedicated training video based on your specific system configuration and content.
Fully featured manuals are available throughout the service for each module, and can be accessed at any time through the system interface. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- If clients require data extraction at the end of their contract, they may request this from their account manager or via the support desk. The team will extract all data from the service, including any uploaded document attachments and provide them to the client in an agreed format via an agreed delivery method. A fee is applicable and is from £3995+VAT (price dependent on volume and complexity of data)
- End-of-contract process
-
At the end of a contract access is automatically revoked from the system.
Clients may request their data, as previously described. All data is held in our systems for a maximum of 12 months following the termination of a contract, unless requested otherwise. This ensures that the data remains available (by request) whilst a replacement service is implemented.
After 12 months, any data or attachments are deleted from our databases.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
A suite of mobile apps are available for Android and iOS, offering offline capabilities that complement the service of the main online system. The apps allow users to take the features of the system, such as task management or auditing to areas where internet connectivity isn't available and still record the necessary details in a familiar interface.
Our online service is built to work on mobile devices through the devices browser; automatically configuring itself for the devices screen size. The full capabilities of the service are available through this method. - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
API's are available for the service to perform specific requirements, such as extracting task lists, or importing user details. access to API's are available upon request.
Typically, our dedicated UK based development team will write an API to meet specific client requirements where they are not meet by our existing library. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
AssessNET has several hundred options that can be used to alter terminology, enable or disable functionality, or present content in different ways. A large number of these changes can be altered by clients through the system interface. Where this isn't possible, our support team are on hand to offer details about the customisable options available and configure them accordingly.
Clients can adjust menu, chart and other interface colours to assist with branding the service to their corporate image. This is in addition to being able to upload a company logo into the system and make it available on all printouts.
Details of all available customisable options will be discussed by an implementation manager during the on-boarding process.
Scaling
- Independence of resources
- Our services are load balanced across multiple servers to ensure resource levels are not impacted.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
A number of service metrics are available from within the service itself, including, but not limited to:
login tracking
record counts
incident statistics
audit statistics
task statistics - Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
Tools are available for core modules that allows the extract of data at scheduled intervals. Extracted data is held within a secure sFTP file store to be retrieved by the client as necessary. Our team control the passwords and access to sFTP file stores.
For larger, full system extracts, clients may request their data, to include uploaded files, via their account manager or our support team. A fee is applicable for data extraction requests. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- Xlsx
- Xls
- Xml
- Json
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Xlsx
- Xls
- Xml
- Json
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
AssessNET has a guaranteed availability of 99.9% per calendar month. Any scheduled maintenance, which may or may not cause downtime, is conducted outside of normal office hours in order to minimise disruption to users.
Our actual service uptime is approximately 99.98% per calendar month, including any scheduled maintenance periods. - Approach to resilience
- This information is available upon request.
- Outage reporting
- Our service does not actively notify of outages. Any planned outages are reported through the inbuilt news feed with an appropriate notice period.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- Identity Federation with clients internal ADFS service
- Access restrictions in management interfaces and support channels
- Access is restricted throughout the system by granular user privileges.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS accredited by BSI
- ISO/IEC 27001 accreditation date
- January 2014
- What the ISO/IEC 27001 doesn’t cover
- Our full service is covered by our accreditation. There are no areas not covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We have a suite of in-house policies and procedures which have been audited by BSI in accordance with our ISO27001:2013 accreditation.
Our polices and procedures restrict access to infrastructure and client data to key members of our team. Access is granted on a sliding scale, depending on the level of access required for a particular role.
All employees are aware of our security policies and refresher training takes place at least every 12 months. Our board of directors are responsible for ensuring polices are followed. Our systems have appropriate controls in place to assist them in ensuring they are followed correctly.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All change requests are tracked throughout their lifecycle until they are incorporated into the main systems, where they are then tracked for support purposes.
All developments are tested against the OWASP top 10 and other controls to ensure potential security impacts are eliminated. Developments are tested across multiple browsers to ensure full compatibility. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Undisclosed
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Undisclosed
- Incident management type
- Undisclosed
- Incident management approach
- Undisclosed
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Wellbeing
-
Wellbeing
All of our team are salaried in line with competitive rates, above the Living Wage. We do not operate any zero hours contracts. We are an equal opportunity employer and employ a diverse range of people reflective of the age, gender, religion or belief, race, sexual orientation and disability of the local population.
As a small business, we do not offer a flexible working scheme, however as a responsible employer we offer flexibility on an individual basis to support our employees’ personal needs – this includes homeworking arrangements.
Ensuring that we provide an environment in which our people can thrive sits at the heart of our people strategy. Below are some of the key initiatives we offer to look after our employee’s wellbeing and to support them in their professional and personal development.
Employee Wellbeing
• The provision an Employee Assistance Programme
• The provision of Fresh fruit and refreshments
• Weekly 1-1s where line managers operate an open and approachable discussion approach covering employee wellbeing
• Weekly whole -company meetings to give staff an effective voice
Reward and Recognition
Celebrating the success and individual achievements of our teams is intrinsically build into our company culture and tangible examples include call outs at team meetings, a section in management reports and monthly employee recognition awards with certificates and prizes. The whole team are rewarded with annual bonuses linked to business performance.
Learning and Development
We are proud of our investment in apprenticeship programmes and one third of our employees started their career at Riskex as apprentices. We work closely with the local college regarding our apprenticeship schemes and employee both administrative and technical apprentices. We have two designated coaches and mentors who have specific responsibility to identify and coordinate learning and development for all employees.
Pricing
- Price
- £9,995 an instance a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Please contact a member of our team.
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at Sales@riskex.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.