Skip to main content

Help us improve the Digital Marketplace - send your feedback

Connected Safety Net

Connected Enviro Net

AI based carbon-calculation and comparison tool: measures the amount of carbon used in maintenance-works/business-processes. Utilises machine-learning to enable: intuitive planning, automate data-processing, the ability to compare results between treatments. Takes live data, calculates carbon for high-volume/low-value works and intelligently produces a report to aid decisions when choosing carbon-saving over cost.

Features

  • Offers software tools for carbon tracking and reduction strategies.
  • Provides software solutions for carbon management and reporting.
  • Specializes in carbon accounting and sustainability reporting.
  • Offers a suite of tools including carbon accounting and ESG
  • Environmental, Social, and Governance Reporting
  • Data importing & exporting

Benefits

  • This version aims to maintain clarity and coherence
  • Organisation wide safer environment
  • Awareness of carbon emissions
  • Reduction in carbon
  • Enhancing safety measures

Pricing

£100 to £803 a licence a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@connectedsafetynet.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 1 9 3 3 0 3 4 6 0 0 3 4 4 2

Contact

Connected Safety Net Paul Richardson
Telephone: 07850111561
Email: info@connectedsafetynet.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
While our products offer robust functionalities, it's important to note some constraints. These may include planned maintenance arrangements to ensure system integrity and security.
The application must also be deployed on the Azure cloud environment.
System requirements
  • Hosting: Microsoft Azure Cloud
  • Modern web browser (Web portal)

User support

Email or online ticketing support
Email or online ticketing
Support response times
For Live clients, the response time is strictly a 2-hour window on business days.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Screen readers have been tested to ensure that the web chat functionality can be supported and works as expected.
Onsite support
Yes, at extra cost
Support levels
On receiving a support request through email or a support-ticket on the support portal, the support coordinator will take following immediate actions:
• Creation of ticket in our support tool if a call received or any other scenario if the ticket has not been created, with relevant information, documents, priority and support level.

We provide 3 support levels:
Level-I
No code change is required. Eg, password reset.

Level-II
Code changes or server configuration required. Eg. Crashes and sever performance issue.

Level-III
Cross functional knowledge and coordination is required along with programming skills. The ticket type Incidents comes under this level if they are not resolved by the level II support. Service Requests with all urgencies/priorities come under this level. All these tickets are managed by mainstream teams in their regular releases.

All levels are included with our default service support package.

We provide both an account manager and a named support engineer for all our customers as the main contact.
Support available to third parties
No

Onboarding and offboarding

Getting started
Client onboarding is a critical process for CSN to ensure that new clients have a smooth and successful transition into using our software.

CSN follows this client onboarding process:
1. Introduction and Welcome
2. Gather Information
3. Training and Education
4. Customization and Configuration
5. Data Migration (if applicable)
6. Testing and Feedback
7. Go-Live
8. Client Support
9. Follow-Up and Review
10. Documentation and Resources
11. Account Management

By following these steps, CSN ensures a successful onboarding experience for our clients, setting them up for long-term satisfaction and success with our software and services.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Clients can request the data extraction, and we extract the data for them. Clients also have the ability to use the reporting feature in the desktop version to extract the data themselves without assistance.
End-of-contract process
This is the default procedure that we would follow at the end of a contract (if it's not renewed):

1) All the data is extracted, sent and removed.
2) All of the users are removed from our systems.
3) We ensure that all customisations and assets are removed as per client request.
4) Any files held in our storage are deleted.

However (at the client request), we can hold onto any data that they would want us to hold temporarily e.g. 12 months.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
WCAG 2.1 A
API
No
Customisation available
Yes
Description of customisation
Assets, output formulas are all customisable in the system. This ensures the system is reporting the correct carbon emissions given the input criteria.

These can be set up through the web portal.

We will generally customise these together with the customer to ensure they are suitable, however, the customer can also customise some elements themselves.

We also offer custom development work if there are extra features and connections that are needed.

Scaling

Independence of resources
CSN clients are typically on-boarded to our multi-tenanted Azure infrastructure. This is a scalable and highly redundant set up, with n+1 components on all levels (gateway, server, database, storage etc).
Auto-scaling is also active on all Azure services where applicable.

However, at the request of the customer, we can also deploy a dedicated/isolated infrastructure stack for a customer (At extra cost).

Analytics

Service usage metrics
Yes
Metrics types
We provide PowerBI reports for any metrics that the user would want.
This allows us to work together and tailor usage metrics to exact requirements.

Examples of reports we have provided to our current clients include:
audit logs, incident logs, monthly completions.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users are able to export data through the web portal. They can choose the format (Excel, CSV or PDF) of the output as well as other filters and parameters regarding the data. Example filters include, date range, sites and locations, status of the incidents.

While the data can be used on any platform the user wishes, we also have in-house expertise to support Power BI reports and is included in our service.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • PDF
Data import formats
  • CSV
  • Other
Other data import formats
Excel

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We have a 99.99% uptime guarantee (excluding scheduled maintenance).
Our incident categories and response times are:

P1 | response: 2 hours | resolution: 24 hours
P2 | response: 24 hours | resolution: 48 hours
P3 | response: 48 hours | resolution: 1 week
P4 | response: 48 hours | resolution: 4 weeks

Response times are only valid during business hours (9am to 5pm, Monday to Friday).
We can also offer an enhanced 24/7 support package at additional cost.
Approach to resilience
The CSN infrastructure is highly resilient and all components are n+1 (redundancy).
● The front end is hosted on a CDN fronted elastic storage.
● The backend service cluster are all containerised and deployed on application services in n+1 configurations. The backend is also behind a load balancer, and will auto-scale with traffic.
● All databases backup and restore procedures are being used, and an additional replica instance have been created.
● The entire server stack is regularly chaos tested to ensure that every component is resilient to unexpected outage without affecting uptime.
Outage reporting
We report service outages via email alerts. Our support desk will also be in direct contact with customers if it is a serious outage.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
All our systems are password and MFA protected. The system also has the concept of users being affiliated to one or more sites. A user can only use the permissions their role provides for sites to which they have been affiliated. Sites that a user is not affiliated to are completely hidden from them.
The system has a three-tier approval workflow that can be configured for each site. Approvers can be chosen from a list of active users that are affiliated with the site and can have any role assigned to them.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Sustainable Management Group
ISO/IEC 27001 accreditation date
10/09/2024
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We are following the below processes as a standard. We are also conducting biannual Internal Audits and planning for an annual external Audit in May 2024.
· Information security policies
· Organization of information security
· Human resource security
· Asset management
· Access control
· Cryptography
· Physical and environmental security
· Operations security
· Communications security
· System acquisition, development, and maintenance
· Supplier relationships
· Information security incident management
· Information security aspects of business continuity management
· Compliance

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We follow the Agile methodology and following the SCRUM framework for our Software Development Processes. We are following a pure SCRUM approach to tackle Configuration and Change Management:
Clear Definition of Done (DoD)
Continuous Integration and Continuous Deployment (CI/CD)
Version Control
Sprint Planning
Change Control Board (CCB)
Regular Retrospectives
Documentation
Collaboration and Communication
Risk Management

By incorporating these practices into the Agile Scrum process, teams can effectively manage configuration and change, ensuring that the project remains adaptable and responsive to evolving requirements and priorities.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Regular penetration testing of the application and the infrastructure is a key part of CSN’s security approach. This testing is targeted to be conducted at least annually and will also be planned in (on an ad-hoc basis) following a major development release.
The testing identifies vulnerabilities of the system to the latest threats and gives the development team the guidance on where to focus security improvement activities. Generally, High and Medium level vulnerabilities will be addressed as soon as possible with a fix and release.
The latest penetration test was conducted by Crowe Advisory Services.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We identify potential compromises by regularly doing internal security tests. These regular tests are done with accordance to web standards such as OWASP (top 10).

Potential compromises are treated with the highest priority and are dealt with as immediate hotfixes.
Incident management type
Supplier-defined controls
Incident management approach
Support scripts are followed for the most common incidents.

Users report incidents via the standard support channels (email, phone, web chat).
The support team is then responsible for managing post production customer support. The support team uses a support portal (Jira) to manage the life cycle of support tickets.
Case Types
Ticket Status
Ticket Priority/Urgency
Support Level-I
Support Level-II
Support Level-III

We provide incidents reports from our support portal on demand.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity
  • Wellbeing

Fighting climate change

Connected Safety Net has pioneered a product called Connected Enviro Net which provides local authorities the ability to manage net zero targets in a pro-active way as we are able to help them see the impact of their day before the day starts. This service development was part funded by Innovate UK as it was awarded the funding based on it's merits of bringing something transformational to the market. This service is currently operational with North Yorkshire Highways as a joint venture to deliver significant change in reducing carbon emissions and helping government departments and private businesses achieve sustainability and net zero targets through digital automation, AI and machine learning. Our digital factory - a separate platform - eliminates the need of all paper and helps companies achieve productivity and efficiency targets through our transformational platform.

Equal opportunity

Connected Safety Net is committed to prioritising diversity in our recruitment and hiring processes, actively seeking out talent from all backgrounds and demographics. Our diverse team bring rich perspectives and experiences to the company which drive innovation and creativity. Opportunities are the same for all employees, regardless of their position or background and individuals are recognised and rewarded based on their contributions and potential, rather than factors such as gender, race, or ethnicity.
Flexible work arrangements allow the company to accommodate the diverse needs of our employees, recognising that everyone has unique circumstances outside of work, e.g. all employees work remotely, and hours can be flexible where necessary to support a healthy work life balance. Our commitment to equal pay ensures that all employees are compensated fairly for their work. By embracing diversity, equity, and inclusion in our organisation, we aim to enhance the lives of our employees but also drive sustainable business success in an increasingly diverse and interconnected world.

Wellbeing

Connected Safety Net fosters a supportive work environment by promoting work-life balance through flexible work arrangements. This allows our employees to manage their professional and personal responsibilities effectively, reducing stress and enhancing overall wellbeing.
Policies such as flexible work hours, part-time working and remote work options allow employees to better manage their personal and professional responsibilities. All employees work remotely and some workers are part-time. Management are empathetic towards employees who may be facing challenges in their personal life.
Employee achievements are recognised and appreciated which aids employee wellbeing by boosting morale and job satisfaction and creating a sense of value and belonging within the organisation.
Management are approachable, open with communication and actively listen whilst empowering employees to take ownership of their work and trusting in their abilities to get the job done effectively.

Pricing

Price
£100 to £803 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Week 1 discovery to help design your service.
Week 2 configure your digital solution specific to your needs.
Week 3-6 free pilot to enable the organization procuring the service to test and demonstrate the value proposition and business case.
Week 7 the service will be chargeable assuming the company approves.
Link to free trial
Www.connectedsafetynet.co.uk

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@connectedsafetynet.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.