Skip to main content

Help us improve the Digital Marketplace - send your feedback

The Audience Agency

Audience Answers - arts, culture, heritage and creative data-driven insights portal

Audience Answers® is a SaaS platform designed for the UK cultural sector, integrating ticketing, survey, open data and financial data to provide insights customisable dashboards, real-time reporting, and strategic benchmarking to enhance audience/digital engagement, policy development, creative place evaluation and financial planning.

Features

  • Data Mesh architecture compatibility
  • Integrated ticketing data analysis
  • Standardised audience demographic surveys
  • Geo-located cultural engagement mapping
  • Open and internal data strategy implementation
  • Multi-source financial insights dashboard
  • Digital analytics reporting
  • Event tracking for website interactions
  • Customizable benchmarking against national averages
  • Collaborative networks for shared insights

Benefits

  • Enhances strategic audience growth initiatives
  • Facilitates data-driven cultural policy development
  • Offers deep insights into audience preferences
  • Targets marketing with high granularity
  • Ensures robust, scalable data integration
  • Supports financial planning and risk assessment
  • Optimises online user engagement
  • Measures key performance indicators effectively
  • Compares performance, guiding improvement
  • Strengthens sector-wide collaboration and intelligence

Pricing

£3,600 to £87,000 a unit a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at nina.douglas@theaudienceagency.org. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 2 2 7 6 0 1 7 6 3 4 7 2 0 6

Contact

The Audience Agency Nina Douglas-Bain
Telephone: 020 7407 4625
Email: nina.douglas@theaudienceagency.org

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Hybrid cloud
Service constraints
Service constraints
Our services are specifically designed for the arts, culture, place, creative, and heritage sectors, focusing on the unique needs and challenges of these fields. This specialisation allows us to provide tailored solutions that enhance engagement, manage collections, and support cultural preservation. However, this focus may limit applicability for industries outside these sectors, as the tools and strategies are optimised for the specific workflows, regulatory requirements, and audience engagement strategies prevalent in the arts and heritage domains.
System requirements
Support for major web browsers like Chrome

User support

Email or online ticketing support
Email or online ticketing
Support response times
Response times are 48 working hours between Monday to Friday (unless they are marked as urgent when it is will be 24 hours).
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Our integrated support offering is designed to provide comprehensive assistance tailored to the Buyers needs. This support package includes: • Dedicated Account Manager: You will have a Dedicated Account Manager who oversees your project from start to finish, providing personalised support and ensuring that all your requirements are met efficiently. • 24/7 Access to our ticketing system: Our dedicated support system with FAQs and support documentation is available around the clock and our support team are able to assist within the hours of 9am to 6pm Monday to Friday. This premium level of support is priced as a percentage of your overall service cost, but additional support can be charged at the SFIA day rates.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Getting started with Audience Answers is streamlined and user-friendly, designed to ensure that users can quickly leverage the full potential of our service:
1. Self-Service Form Request: Users can begin by filling out a self-service form that captures basic information and specific requirements. This form is accessible online and allows for immediate engagement.
2. Support Team Contact: For users who prefer direct interaction or need guidance, our support team is available to assist with the onboarding process. They can be reached via email, phone, or live chat.
3. Onboarding Review: Once initial contact is established, we schedule an onboarding review session. A consultant will discuss the specific requirements.
4. User Account Creation: We then set up user accounts and provide credentials, ensuring users have access to the system.
5. Customisation and Training: Depending on the user’s needs, customisation of insights and features may be implemented. We can provide online training, in-person support a dedicated support site to help users navigate and optimise their use of the service.
6. Ongoing Cloud Support Services: For complex requirements or further customisation, our Cloud support services are available to provide additional assistance and ensure users achieve their desired outcomes with the platform.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
At the end of a contract, users can securely extract their data through a straightforward process facilitated by our dedicated account team. To initiate the data extraction, users should contact their account manager, who will guide them through the procedure and ensure compliance with all security protocols.

The preferred method for secure data transfer is via SFTP (Secure File Transfer Protocol), which provides robust encryption for data in transit. Alternatively, other secure transfer methods can be arranged based on the user's specific security requirements and preferences.

The account team assists in scheduling the data transfer, ensuring that it occurs at a convenient time for the user and within the terms of the contract's end date. Before the transfer, data is prepared, consolidated, and, if necessary, converted into a commonly used format as agreed upon by both parties, ensuring it is readily usable post-transfer.

Throughout the process, the account team remains in close communication with the buyer to address any concerns and to confirm the secure and complete transfer of all requested data, thus ensuring a smooth and compliant transition at the contract's conclusion
End-of-contract process
At the end of the contract, our account team collaborates closely with the buyer to decommission the service securely and efficiently. This process follows a standard template, including deactivating user accounts and revoking access.

Decommissioning Steps:
1. Notification and Planning: Buyers are notified in advance to plan the decommissioning process.
2. Data Handling: We discuss and arrange for the return or destruction of Buyer data and any buyer-owned intellectual property (IP) per their instructions.
3. Service Shutdown: User accounts are deactivated, and service access is revoked.
4. Final Audit: A final audit ensures all obligations are met and no residual data remains, unless legally required.
The contract price covers service usage, ongoing support, and standard end-of-contract data handling. Additional services such as extensive data extraction or specific data format conversions during decommissioning may incur SFIA day rate charges. These potential additional costs are clearly communicated during contract negotiations and end-of-contract discussions to ensure transparency. This structured approach ensures a clear, compliant, and trouble-free transition at the contract’s conclusion.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Mobile Version
- Responsive Design: The layout adjusts to fit smaller screens, prioritising ease of use and readability. Text sizes are increased, and images or elements are resized accordingly.
- Condensed Navigation: Menu options are moved behind dropdowns or into a "hamburger" menu (three horizontal lines). This menu typically appears at the top corners of the screen, providing access to various sections of the service without cluttering the view.
- Touch-friendly Interface: Buttons and links are made larger to accommodate touch interactions, ensuring that elements are easily tappable.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
The Audience Answers Data Mesh architecture enables users and their partners to securely transmit data automatically through a well-defined Application Programming Interface (API). This API facilitates seamless and secure data integration by establishing a standardised communication protocol that any authorised system can use to connect and transfer data.
The process begins with authentication, where each user or partner system must provide credentials to verify their identity. This ensures that only authorised entities can access the API. Once authenticated, the API supports encrypted data transmission to maintain confidentiality and integrity. Data sent through the API is encapsulated in HTTPS protocols, safeguarding it against interception or tampering during transit.
Furthermore, the API is designed to handle various data formats and structures, enabling flexibility in how data is sent and received. It also provides error handling mechanisms to ensure data consistency and reliability. Users and partners can leverage this API to automate their data workflows, ensuring efficient and secure data exchanges as part of the broader data mesh infrastructure.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
TO ENTER

Scaling

Independence of resources
Our data architecture's scalability ensures the independence of resources by dynamically adjusting capacity based on demand, thereby maintaining performance without overloading any single component. This is achieved through automatic scaling solutions that can seamlessly expand or contract resource allocation. Additionally, our DevOps play a crucial role, monitoring system performance and resource utilisation. Analytics tools detect and resolve potential issues before they impact service quality, ensuring each client's operations remain isolated and unaffected by others, thus upholding robust performance and reliability

Analytics

Service usage metrics
Yes
Metrics types
1. Uptime/Availability: Percentage of time the service is operational.
2. Response Time: Time taken to respond to user requests.
3. Incident Frequency: Number of reported incidents within a specific period.
4. Freedom of Information: Frequency and type of reports (or support provided to Buyer)
5. System Performance: Metrics on throughput, capacity, and system utilisation.
6. Security Incidents: Frequency and type of security breaches.
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Less than once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can easily export insights directly from our service using embedded features that allow for the downloading of data in PDF or CSV formats, accessible through the user interface. For data formats or exports not available through these standard options, our support team is ready to assist. Upon request, they can facilitate additional data exports tailored to specific needs, ensuring users have access to their data in the required format for further analysis or reporting. This combination of self-service tools and support assistance ensures flexibility and user convenience.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We guarantee a 99% uptime for our services, excluding scheduled maintenance windows. This commitment is enshrined in our Service Level Agreement (SLA), ensuring high availability and reliability of our services.

SLA Details:

Availability Guarantee: Our SLA promises an operational uptime of 99% over each calendar month, calculated excluding previously scheduled maintenance periods. These maintenance events are communicated in advance to minimize any disruption to your operations.

Monitoring and Reporting: We continuously monitor our systems and provide clients with monthly uptime reports, which detail the service performance and any downtime occurrences.

Our SLA policies are designed to provide assurance and demonstrate our commitment to maintaining high levels of service availability, ensuring that our clients can depend on our services for their critical operations.
Approach to resilience
Our service is designed with resilience as a core principle to ensure continuity and robustness under various operational conditions. Here’s how we achieve this:
Multi-Layered Resilience Design:
• Redundancy: Critical components of our infrastructure, including servers, storage, and network devices, are configured in a redundant setup across multiple data centers. This redundancy ensures that if one component fails, another can seamlessly take over without impacting service availability.
• Data Replication: We employ real-time data replication across dispersed data centers within the EU. This not only protects data integrity but also ensures data availability even if one location suffers a disruption.
Data Centre Resilience:
• Physical Security: Our data centres are equipped with state-of-the-art security measures, including biometric access controls, surveillance cameras, and 24/7 monitoring.
• Environmental Controls: We use advanced environmental controls to manage temperature and humidity, ensuring optimal performance of hardware. Backup power supplies and generators are in place to handle power outages.
• Network Connectivity: Multiple network paths and providers ensure that our network remains operational even if one provider experiences issues.
By integrating these resilient features into our service design, we can assure our customers of our commitment to maintaining high service availability and robust security.
Outage reporting
Our service employs a robust system for outage reporting to ensure users are promptly informed of any service disruptions. Here’s how we manage and report outages:
Real-Time Monitoring: We actively monitor our service across all operational stages—from development through to deployment and production. This continuous surveillance enables swift detection and response to any potential outages.
Notification Systems:
• Email Alerts: As soon as an issue is detected, email notifications are sent to registered users, with continuous updates provided until the issue is resolved.
• Mobile App Notifications: Our service includes a mobile app that sends push notifications directly to users’ devices, alerting them to any disruptions.
• Text Messaging: For critical alerts, we also use text messages to ensure that users receive immediate and direct communication regarding service interruptions.
Alert Levels: Our alert system is tiered, categorising notifications by severity. This ensures that users receive information that is pertinent to the urgency and potential impact of the outage.
Through these communication channels, we ensure that users are well-informed and can make necessary adjustments during any service disruptions, maintaining effective management and minimal operational impact.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Access to our service is tightly controlled through email verification and role-based permissions, which restrict access to specific features and functionalities based on user needs. Access levels are carefully managed by a nominated admin, typically the buyer's designated champion(s). This ensures that only authorised personnel can access sensitive management interfaces and support channels, effectively safeguarding against unauthorised access and maintaining the integrity of the system. These measures are critical for protecting our management environments and ensuring secure operations.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Our service is Cyber Essentials certified and aligns with cloud security principles. We are actively working towards ISO/IEC 27001 certification to enhance our information security management system, ensuring continuous improvement in our security measures and compliance.
Information security policies and processes
Our information security framework is anchored by stringent policies and processes, meticulously overseen by our dedicated Data Executive. This role is pivotal in ensuring robust Information Governance and Security Systems and the enforcement of our Information Security Policies.
Our security policies cover various aspects, including but not limited to data protection, access control, risk management, and incident response. These policies are regularly reviewed and updated to align with evolving security threats and compliance requirements. Training and awareness programs for staff, ensuring that policies are well-understood and consistently applied across the organisation.
To ensure adherence to these policies, the Data Executive implements a structured reporting system that allows for real-time monitoring and immediate action on security issues. Regular audits are conducted to assess compliance, identify potential vulnerabilities, and measure the effectiveness of current security measures. Remedial actions are prioritised and implemented based on audit findings, ensuring continuous improvement of our security posture.
This comprehensive approach guarantees that our information security practices are not only compliant with current standards but are also robust and proactive in mitigating risks.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We manage configuration and change through a structured process, beginning with a Statement of Work (SoW) to confirm initial specifications. Changes are handled via Change Request documentation submitted to the Account Manager, ensuring traceability. These requests are then processed through our systemised internal procedures, covering authorisation and development phases. All service components are tracked throughout their lifecycle. Each change is rigorously assessed for potential security impacts by our team to mitigate risks and ensure stability is maintained throughout the service’s evolution.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our vulnerability management is overseen by the Data Executive and informed by both our development team and external sources like US-CERT. We proactively assess threats through continuous monitoring and regular security testing throughout the platform's lifecycle. Patches are deployed swiftly upon identification of critical vulnerabilities. We stay updated on potential threats through alerts from reputable security organisations and industry-standard sources, ensuring a robust defense against emerging security challenges. This comprehensive approach ensures our services remain secure and resilient against threats.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our proactive monitoring approach is designed to ensure the continuous security and performance of our services.
1. Continuous System Scanning: We use monitoring tools that assess our systems for signs of abnormal activity or potential security threats. This includes automated scanning for vulnerabilities, performance anomalies, and unauthorised access attempts.
2. Regular Updates and Patch Management: As part of our proactive stance, we regularly update our systems and apply security patches proactively. This ensures that vulnerabilities are addressed before they can be exploited.
By maintaining a vigilant/proactive monitoring system, we can ensure the high reliability, availability, and security of our services.
Incident management type
Supplier-defined controls
Incident management approach
Our incident response policy is designed to effectively manage/mitigate any potential compromises. Here’s how we approach protective monitoring:
1. Identification of Potential Compromises: We use monitoring tools within the development and production environments to scan our systems for unusual activity that may indicate a compromise.
2. Response to Potential Compromises: Our incident response team is immediately notified. Our team follows a structured protocol thorough investigation to understand the extent and impact of the breach.
3. Speed of Response: All incidents are addressed according to an SLA that specifies response times, ensuring quick action to minimise potential risks and impacts.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Covid-19 recovery
  • Tackling economic inequality
  • Wellbeing

Covid-19 recovery

In the context of COVID-19 recovery, our services focus on harnessing cultural data to help arts and culture organisations navigate the post-pandemic landscape. By analysing trends and impacts, we can identify resilient strategies that enable these institutions to reconnect with their audiences, innovate in their offerings, and secure necessary funding. Our data-driven insights also guide organisations in reconfiguring physical spaces and digital presence to align with new health guidelines and audience expectations, ensuring a safe and engaging cultural experience.

Tackling economic inequality

Addressing economic inequality within the arts and culture sectors involves using data to uncover and tackle disparities in access and participation. Our services support organisations in understanding the demographic and socio-economic composition of their audiences and the broader community. This insight allows for the development of programs and policies that are inclusive and equitable, ensuring that cultural enrichment benefits a diverse range of participants. Additionally, we provide data that can help argue for targeted funding and resources, aiming to level the playing field and foster a more inclusive cultural landscape.

Wellbeing

Enhancing community wellbeing through arts and culture is a crucial focus of our data services. By analysing engagement patterns and feedback, we help organisations to craft experiences that promote mental health and overall wellbeing. This includes identifying therapeutic aspects of cultural participation and tailoring programs to serve as powerful tools for healing and social connection. Our insights aid in creating initiatives that address specific community needs, such as programs for seniors, youths, and marginalised groups, ensuring that the arts remain a vital part of maintaining and enhancing community health and happiness.

Pricing

Price
£3,600 to £87,000 a unit a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at nina.douglas@theaudienceagency.org. Tell them what format you need. It will help if you say what assistive technology you use.