Connected Enviro Net
AI based carbon-calculation and comparison tool: measures the amount of carbon used in maintenance-works/business-processes. Utilises machine-learning to enable: intuitive planning, automate data-processing, the ability to compare results between treatments. Takes live data, calculates carbon for high-volume/low-value works and intelligently produces a report to aid decisions when choosing carbon-saving over cost.
Features
- Offers software tools for carbon tracking and reduction strategies.
- Provides software solutions for carbon management and reporting.
- Specializes in carbon accounting and sustainability reporting.
- Offers a suite of tools including carbon accounting and ESG
- Environmental, Social, and Governance Reporting
- Data importing & exporting
Benefits
- This version aims to maintain clarity and coherence
- Organisation wide safer environment
- Awareness of carbon emissions
- Reduction in carbon
- Enhancing safety measures
Pricing
£100 to £803 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 1 9 3 3 0 3 4 6 0 0 3 4 4 2
Contact
Connected Safety Net
Paul Richardson
Telephone: 07850111561
Email: info@connectedsafetynet.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
-
While our products offer robust functionalities, it's important to note some constraints. These may include planned maintenance arrangements to ensure system integrity and security.
The application must also be deployed on the Azure cloud environment. - System requirements
-
- Hosting: Microsoft Azure Cloud
- Modern web browser (Web portal)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- For Live clients, the response time is strictly a 2-hour window on business days.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Screen readers have been tested to ensure that the web chat functionality can be supported and works as expected.
- Onsite support
- Yes, at extra cost
- Support levels
-
On receiving a support request through email or a support-ticket on the support portal, the support coordinator will take following immediate actions:
• Creation of ticket in our support tool if a call received or any other scenario if the ticket has not been created, with relevant information, documents, priority and support level.
We provide 3 support levels:
Level-I
No code change is required. Eg, password reset.
Level-II
Code changes or server configuration required. Eg. Crashes and sever performance issue.
Level-III
Cross functional knowledge and coordination is required along with programming skills. The ticket type Incidents comes under this level if they are not resolved by the level II support. Service Requests with all urgencies/priorities come under this level. All these tickets are managed by mainstream teams in their regular releases.
All levels are included with our default service support package.
We provide both an account manager and a named support engineer for all our customers as the main contact. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Client onboarding is a critical process for CSN to ensure that new clients have a smooth and successful transition into using our software.
CSN follows this client onboarding process:
1. Introduction and Welcome
2. Gather Information
3. Training and Education
4. Customization and Configuration
5. Data Migration (if applicable)
6. Testing and Feedback
7. Go-Live
8. Client Support
9. Follow-Up and Review
10. Documentation and Resources
11. Account Management
By following these steps, CSN ensures a successful onboarding experience for our clients, setting them up for long-term satisfaction and success with our software and services. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Clients can request the data extraction, and we extract the data for them. Clients also have the ability to use the reporting feature in the desktop version to extract the data themselves without assistance.
- End-of-contract process
-
This is the default procedure that we would follow at the end of a contract (if it's not renewed):
1) All the data is extracted, sent and removed.
2) All of the users are removed from our systems.
3) We ensure that all customisations and assets are removed as per client request.
4) Any files held in our storage are deleted.
However (at the client request), we can hold onto any data that they would want us to hold temporarily e.g. 12 months.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Assets, output formulas are all customisable in the system. This ensures the system is reporting the correct carbon emissions given the input criteria.
These can be set up through the web portal.
We will generally customise these together with the customer to ensure they are suitable, however, the customer can also customise some elements themselves.
We also offer custom development work if there are extra features and connections that are needed.
Scaling
- Independence of resources
-
CSN clients are typically on-boarded to our multi-tenanted Azure infrastructure. This is a scalable and highly redundant set up, with n+1 components on all levels (gateway, server, database, storage etc).
Auto-scaling is also active on all Azure services where applicable.
However, at the request of the customer, we can also deploy a dedicated/isolated infrastructure stack for a customer (At extra cost).
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We provide PowerBI reports for any metrics that the user would want.
This allows us to work together and tailor usage metrics to exact requirements.
Examples of reports we have provided to our current clients include:
audit logs, incident logs, monthly completions. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Users are able to export data through the web portal. They can choose the format (Excel, CSV or PDF) of the output as well as other filters and parameters regarding the data. Example filters include, date range, sites and locations, status of the incidents.
While the data can be used on any platform the user wishes, we also have in-house expertise to support Power BI reports and is included in our service. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We have a 99.99% uptime guarantee (excluding scheduled maintenance).
Our incident categories and response times are:
P1 | response: 2 hours | resolution: 24 hours
P2 | response: 24 hours | resolution: 48 hours
P3 | response: 48 hours | resolution: 1 week
P4 | response: 48 hours | resolution: 4 weeks
Response times are only valid during business hours (9am to 5pm, Monday to Friday).
We can also offer an enhanced 24/7 support package at additional cost. - Approach to resilience
-
The CSN infrastructure is highly resilient and all components are n+1 (redundancy).
● The front end is hosted on a CDN fronted elastic storage.
● The backend service cluster are all containerised and deployed on application services in n+1 configurations. The backend is also behind a load balancer, and will auto-scale with traffic.
● All databases backup and restore procedures are being used, and an additional replica instance have been created.
● The entire server stack is regularly chaos tested to ensure that every component is resilient to unexpected outage without affecting uptime. - Outage reporting
- We report service outages via email alerts. Our support desk will also be in direct contact with customers if it is a serious outage.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
-
All our systems are password and MFA protected. The system also has the concept of users being affiliated to one or more sites. A user can only use the permissions their role provides for sites to which they have been affiliated. Sites that a user is not affiliated to are completely hidden from them.
The system has a three-tier approval workflow that can be configured for each site. Approvers can be chosen from a list of active users that are affiliated with the site and can have any role assigned to them. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Sustainable Management Group
- ISO/IEC 27001 accreditation date
- 10/09/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We are following the below processes as a standard. We are also conducting biannual Internal Audits and planning for an annual external Audit in May 2024.
· Information security policies
· Organization of information security
· Human resource security
· Asset management
· Access control
· Cryptography
· Physical and environmental security
· Operations security
· Communications security
· System acquisition, development, and maintenance
· Supplier relationships
· Information security incident management
· Information security aspects of business continuity management
· Compliance
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We follow the Agile methodology and following the SCRUM framework for our Software Development Processes. We are following a pure SCRUM approach to tackle Configuration and Change Management:
Clear Definition of Done (DoD)
Continuous Integration and Continuous Deployment (CI/CD)
Version Control
Sprint Planning
Change Control Board (CCB)
Regular Retrospectives
Documentation
Collaboration and Communication
Risk Management
By incorporating these practices into the Agile Scrum process, teams can effectively manage configuration and change, ensuring that the project remains adaptable and responsive to evolving requirements and priorities. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Regular penetration testing of the application and the infrastructure is a key part of CSN’s security approach. This testing is targeted to be conducted at least annually and will also be planned in (on an ad-hoc basis) following a major development release.
The testing identifies vulnerabilities of the system to the latest threats and gives the development team the guidance on where to focus security improvement activities. Generally, High and Medium level vulnerabilities will be addressed as soon as possible with a fix and release.
The latest penetration test was conducted by Crowe Advisory Services. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We identify potential compromises by regularly doing internal security tests. These regular tests are done with accordance to web standards such as OWASP (top 10).
Potential compromises are treated with the highest priority and are dealt with as immediate hotfixes. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Support scripts are followed for the most common incidents.
Users report incidents via the standard support channels (email, phone, web chat).
The support team is then responsible for managing post production customer support. The support team uses a support portal (Jira) to manage the life cycle of support tickets.
Case Types
Ticket Status
Ticket Priority/Urgency
Support Level-I
Support Level-II
Support Level-III
We provide incidents reports from our support portal on demand.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
Connected Safety Net has pioneered a product called Connected Enviro Net which provides local authorities the ability to manage net zero targets in a pro-active way as we are able to help them see the impact of their day before the day starts. This service development was part funded by Innovate UK as it was awarded the funding based on it's merits of bringing something transformational to the market. This service is currently operational with North Yorkshire Highways as a joint venture to deliver significant change in reducing carbon emissions and helping government departments and private businesses achieve sustainability and net zero targets through digital automation, AI and machine learning. Our digital factory - a separate platform - eliminates the need of all paper and helps companies achieve productivity and efficiency targets through our transformational platform.Equal opportunity
Connected Safety Net is committed to prioritising diversity in our recruitment and hiring processes, actively seeking out talent from all backgrounds and demographics. Our diverse team bring rich perspectives and experiences to the company which drive innovation and creativity. Opportunities are the same for all employees, regardless of their position or background and individuals are recognised and rewarded based on their contributions and potential, rather than factors such as gender, race, or ethnicity.
Flexible work arrangements allow the company to accommodate the diverse needs of our employees, recognising that everyone has unique circumstances outside of work, e.g. all employees work remotely, and hours can be flexible where necessary to support a healthy work life balance. Our commitment to equal pay ensures that all employees are compensated fairly for their work. By embracing diversity, equity, and inclusion in our organisation, we aim to enhance the lives of our employees but also drive sustainable business success in an increasingly diverse and interconnected world.Wellbeing
Connected Safety Net fosters a supportive work environment by promoting work-life balance through flexible work arrangements. This allows our employees to manage their professional and personal responsibilities effectively, reducing stress and enhancing overall wellbeing.
Policies such as flexible work hours, part-time working and remote work options allow employees to better manage their personal and professional responsibilities. All employees work remotely and some workers are part-time. Management are empathetic towards employees who may be facing challenges in their personal life.
Employee achievements are recognised and appreciated which aids employee wellbeing by boosting morale and job satisfaction and creating a sense of value and belonging within the organisation.
Management are approachable, open with communication and actively listen whilst empowering employees to take ownership of their work and trusting in their abilities to get the job done effectively.
Pricing
- Price
- £100 to £803 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Week 1 discovery to help design your service.
Week 2 configure your digital solution specific to your needs.
Week 3-6 free pilot to enable the organization procuring the service to test and demonstrate the value proposition and business case.
Week 7 the service will be chargeable assuming the company approves. - Link to free trial
- Www.connectedsafetynet.co.uk