iHasco eLearning
iHasco's workplace eLearning solution helps over 10,000 organisations work towards compliance with various Health & Safety and HR legislation.
With over 150 highly-engaging courses, a simple, yet effective Learning Management System and unrivalled support, iHasco are a market-leading provider of workplace
Features
- Interactive eLearning in Health and Safety, Compliance and many more.
- Real-time reporting of training outcomes
- Automated email reminders
- Multilingual learning with 41 languages supported
- Digital certificates to minimise administration
- End-of-course tests to reinforce learning
- 24/7 monitoring to deliver maximum uptime and availability
- Effective Learning Management System (LMS)
- Add your company documents to the Learning Management System (LMS)
- Display Screen Equipment (DSE) Assessment Tool
Benefits
- Complete workplace training on the go, on any device
- Quickly see who has and who hasn't completed their training
- Unrivalled service and support delivering 99.5% uptime
- Dedicated account management providing extra value
- Easy management and reporting saving valuable administration time
- Extensive course library of over 180 courses
- Access to free FAQ'S and additional resources
- Artificial Intelligence (AI) powered ChatBot for greater support 24x7
- Highly regarded: recommended by 96.7% of our 10,000 plus clients
- Highly secure platform evidenced by Cyber Essentials and ISO27001 accreditation
Pricing
£2.77 to £40 a user
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 1 0 8 5 0 9 1 2 0 8 7 6 5 1
Contact
iHASCO LTD
Alex King
Telephone: 01344 867088 EXT 464
Email: alex.king@ihasco.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Course content can be used in third-party learning management systems via Sharable Content Object Reference Model (SCORM) packages.
- Cloud deployment model
- Private cloud
- Service constraints
- No service constraints exist today.
- System requirements
-
- Secure web connection
- Modern standards compliant web browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We aim to provide a response within 4 working hours if sent during 9am - 5pm, Monday to Friday.
Priority 1 (System Unavailable): Target issue response within 2 working hours, target fix within 4 working hours.
Priority 2 (System available, but a complete function unavailable): Target issue response within 4 working hours, target fix within 8 working hours. Priority 3 (System available, fault exists but can workaround): Target issue response within 2 working days, target fix within 2 working weeks.
Priority 4 (Minor issue but system functions without workaround): Target issue response 2 working weeks, target fix within 8 weeks. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- N/A
- Onsite support
- No
- Support levels
-
We give the same excellent levels of support to each and every person who gets in touch with us, regardless of whether they are a client or not. Our support team are on hand from Monday - Friday, 9am to 5pm to deal with any queries from clients or prospective clients.
Clients are given a dedicated Account Manager and have full access to IT support.
No technical account manager, and no cloud support engineer. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Online training to demonstrate how to use the platform.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
The Learning Management System provides the ability to:
Export all users in CSV format, download all training certificates as a multi page PDF and export all user training records in CSV format. Additionally, clients can use our API (at no added cost) to extract the same data. We pro-actively reach out to clients during the off-boarding process to ensure that they have everything they need prior to termination of their account. - End-of-contract process
- At the end of a contract, we would encourage clients to renew their service subscription with us. However, we recognise that sometimes clients outgrow us or choose to go elsewhere for a variety of reasons. We believe strongly in helping to make that as easy as possible and do not impose any additional charges beyond what a client has agreed to pay contractually.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- All features of the desktop service are available on mobile. We use a responsive layout to adapt our web application to a variety of screen sizes.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Our web application has a user interface which is built with semantic HTML markup and CSS for presentational styling.
- Accessibility standards
- None or don’t know
- Description of accessibility
- We do not currently adhere to a specific accessibility standard but are striving towards WCAG 2.1 A and have begun running routine accessibility audits on both our website and application.
- Accessibility testing
-
We use automated tools which highlight areas which require attention.
We also conduct manual tests using assistive technology such as screen readers. - API
- Yes
- What users can and can't do using the API
-
Clients can use the API to sync users from other management systems and/or pull out data for storage in other systems as required.
The iHasco client API is a RESTful service that can be accessed at https://api.ihasco.co.uk.
We support requests in JSON (JavaScript Object Notation) format.
Starting with version 2, we use the Semantic Versioning to describe the version of the API.
A specific major version may be specified via an Accept header. The default is v2 :application/vnd.ihasco.v2+json.
We keep our API backwards compatible. E.g., if you need version 1 data, please specify application/vnd.ihasco.v1+json, or use the previous version of the API.
Alternatively, you may send an API version integer value as a query parameter.
Every request must supply a valid API token. You can create tokens via the "Settings" area of your Client LMS and there are 3 ways to provide a token.
Clients can use the API to sync users from other management systems and/or pull-out data for storage in other systems as required.
Documentation is available here:
https://api.ihasco.co.uk - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Admins can:
Add their own branding to their training suites and certificates, hide/disable some elements of the users training suite, enable/disable/change training intervals and required passmarks for courses, create segments and set up smart enrolments, create their own email templates, add custom course completion text and additional certificate text and add their own documents and policies, make them required reading and link them to courses or segments.
Our system and courses all work with other third party LMS’s too, so you can customize your learning environment and blend our courses into your LMS. e.g., Absorb, Docebo, Talnet LMS and Totara are used by some clients via the Shareable Content Object Reference Model (SCORM) v1.2
Scaling
- Independence of resources
-
We monitor application stability on a continual basis using real time monitoring tools such as New Relic.
Our application is split into a number of component parts which spreads the load between a primary application server, database server, worker server, notification server and caching server.
We also utilise multiple CDNs for the delivery of the video-based content which our application delivers to users for the purpose of fulfilling our service.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
IHasco's Learning Management System dashboard provides information on:
Number of registered users,
Number of users enrolled in each course,
Number of users with not started, completed, failed and/or expired training status,
Percentage of users who are compliant across an organisation based on the above,
Number of attempts made by users to pass training; and
Time spent by users completing training for Continuous Professional Development (CPD). - Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via our web interface (CSV) or the API (JSON).
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Support Period: iHasco support is available to clients from 9am - 5pm (GMT) on business working days.
We provide highly resilient services based on Amazon Web Services’ (AWS) cloud-based highly available and scalable platforms, leveraging the best industry approaches to deliver RPO and RTO targets and metrics. This delivers ~99.5% real world uptime. - Approach to resilience
- Available on request.
- Outage reporting
-
Alert on social media platforms.
Alert on our public website.
Alert via email.
Record of uptime via New Relic monitoring.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Permission based access and regular review of permission levels.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
-
Password requirements: 8-15 characters, at least one lowercase letter, at least one uppercase letter, at least one number, at least one special character (?!*@).
IP address restricted.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Approachable Certification
- ISO/IEC 27001 accreditation date
- 2023
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We adhere to industry best practice and have received the government backed Cyber Essentials accreditation.
- Information security policies and processes
-
IHasco has a comprehensive Security Management Statement that details our polices, https://www.ihasco.co.uk/assets/terms-and-policies/iHasco_Information_Security_Statement.pdf.
Our clients trust iHasco with their data, and we make it a priority to take our clients’ security and privacy concerns seriously. We strive to ensure that user data is retained securely, and that we collect only as much personal data as is required to provide our services to clients in an efficient, lawful and effective manner.
Summary of statement topics:
Application and User Security: SSL/TLS Encryption, User Authentication, User Password Management, Data Portability, Privacy and Encryption.
Data Centres: Design - we use AWS’ assured design and operations policies, Physical Security, Environmental Controls, Data Location, and Availability.
Application Security: Uptime, Third Party Scanning, Testing, Access Control, and Penetration Testing.
Backups: Frequency, Retention, and Server Snapshots.
Organisational: Employee Screening, Training, Third Parties, Access, InfoSec, Accreditations.
Software Development Practise: Stack and Coding Practises.
Security Breaches.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We follow industry best practice for software development. We track change requests, maintain code in a version-controlled environment, require that changes pass tests and require code review prior to deployment.
We deploy changes to a development environment and assess these for potential security issues using industry leading vulnerability scanning tools. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We assess threats to our services using two third party continual vulnerability scanning services:
* Fortify on demand (Micro Focus)
* Detectify
We aim to respond to and resolve high risk vulnerabilities within 5 working days (if not less). - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We follow the general guidance as set out in the CESG's GPG13 guidance on Protective Monitoring Controls (PMC), to record and monitor activity in order to ensure we are well positioned to identify and address potential compromises.
A potential compromise would be immediately reviewed by management in order to assess the risk and decide on appropriate steps to mitigate any potential damage.
Risk level is used to determine response turnaround and reporting of the risk. - Incident management type
- Supplier-defined controls
- Incident management approach
- We have established processes for the reporting and management of common incidents. These include security breaches, performance issues and unexpected application behaviour. Incidents are reported initially to the IT Manager and then subsequently escalated to senior management if necessary. Incidents are reported either verbally (and then confirmed by return email) or via email in the first instance. Incident reports are compiled and reported to the management team on a weekly basis. We report, where relevant, incidents and outcomes to affected stakeholders including clients.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
The Citation Group and its subsidiaries, including iHasco Limited, have committed to the Science Based Targets initiative (SBTi) and have an active commitment to set science-based targets. The Citation Group is in the final stages of establishing their emissions reduction targets in line with the SBTi’s criteria before presenting it to the SBTi for official validation. As part of this iHasco Limited does and will continue to measure and report on its scope 1, 2 and 3 Green House Gas Emissions. We have a commitment to achieving Net Zero by 2050 and initiatives in place to achieve this.Covid-19 recovery
As part of their service, iHasco provide a variety of eLearning modules which support businesses with Covid-19 recovery. For example, their returning to Work after COVID-19 Training was designed to assist colleagues in making a smooth transition back to the working environment, whether they had been furloughed or were working from home. Further topics include responding to and managing change, infection prevention and control and risk assessment training.Tackling economic inequality
iHasco is committed to paying colleagues the National Living Wage at minimum. We pay into and utilise our Apprenticeship Levy to upskill colleagues in junior customer service, sales and HR roles. Where possible, iHasco offers flexible working arrangements to help enable a more inclusive approach to employment.Equal opportunity
iHasco strives to encourage and has seen the benefits of having a diverse and inclusive workforce. Diversity and inclusion is not just about seen differences, it covers hidden and perceived differences across background, education, social differences, neuro diversity, age, gender, religion, ethnicity, beliefs and much more. Inclusion isn’t just a policy; it’s part of the fabric of our culture. We want to learn from diverse perspectives, drive innovation, grow together and create an environment where differences are embraced so everyone can thrive at work.
In the last 12 months >65% of colleagues have undertaken development above the requirements of their and our Women in Leadership Programme has helped us to accelerate the careers of high potential women.
From a client perspective, iHasco delivered over 7,000,000 successfully completed eLearning modules in 2023 which included topics such as Equality, Diversity and Inclusion, unconscious bias and disability awareness and inclusion.Wellbeing
We want to be the business that colleagues want to work for and clients want to work with. That is why colleague engagement is at the heart of our business strategy. We are proud of culture and our colleagues, who have together created a great place to work – evidenced through our leading colleague engagement scores.
iHasco has a number of colleagues who are trained as Mental Health First Aiders and colleagues have access to an Employee Assistance Programme as part of their healthcare benefit.
From a client perspective, iHasco delivered over 7,000,000 successfully completed eLearning modules in 2023 which included topics such as Mental Health awareness, building resilience, stress awareness and bullying and harassment.
Pricing
- Price
- £2.77 to £40 a user
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
A 14-day free trial of our entire course library is available.
There is nothing to install and its accessible over the web.
No obligation is created, and no credit card or payment details are required either.
Access to our Learning Management System is not included. - Link to free trial
- https://www.ihasco.co.uk/try