VisionTime - Time and Attendance System
VisionTime enables organisations to manage time and attendance, flexitime and all flexible and hybrid working at the office, home or remotely. Create schedules, apply rules, manage holidays, absence and reports. Integrates with payroll, access control or HR. Manage flexible working policies, track and monitor hours worked daily/weekly/monthly with flexi leave.
Features
- Clock-In via Terminals, Mobile, or PC
- Time and Attendance, Flexitime, Flexible Working and Shift Management
- Hybrid Working Management, Office Attendance Monitoring, Optional GPS
- Project Resource Assignment, Productivity Tracking
- Real Time Reporting and Dashboards
- HR Systems, Payroll Systems, HRM, HRIS and Access Control Integration
- Employee Self Service, Configurable Approval Workflow
- Time Bank Manager, Flexitime, Time Off In Lieu, TOIL
- Annual Leave/Sick Leave Management
- Timesheets / E-Rostering / Annualised Hours
Benefits
- Improves Recruitment, Employee Loyalty, Satisfaction and Retention
- Reduced Overtime Costs
- Faster and More Accurate Payroll Processing
- Auditable Compliance with Flexible Working Regulations
- Improves Employee Motivation and Discretionary Effort
- Accurate Workforce Time, Resource Management and Productivity
- Systemised Compliance with Current and Future HR Policy
- Save Time with Employee Self Service with Approval Workflows
- HR Integration to improve efficiency
- Manages Time and Attendance for Home, Office and Remote Work
Pricing
£2.54 to £4.93 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 4 7 5 4 2 1 4 4 4 9 3 3 9 6
Contact
MULTITIME SYSTEMS LIMITED
Aidan Murphy
Telephone: 353 1 260 9680
Email: gcloud@flextime.ie
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- HRIS System HR system Access Control Systems Payroll Systems Rostering System
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Service constraints
- No
- System requirements
-
- MS SQL Server Enterprise/Express
- MS IIS
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Standard SLA is 24 Hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- 1 - Critical 1 Hour Critical business impact – for example: · Entire System is unavailable e.g. client unable to access the online T&A system Within 1 Working Day (with a workaround within 4 hours) 2 - High 2 hours Major business impact – for example: · An important component of the System is unavailable Within 2 Working Days 3 - Medium - 4 hours Medium business impact – for example: · A component of the System is subject to fault but a workaround exists *Fixed for Release within 10 working Days 4 - Low 4 hours Minor business impact – for example: · Functionality problems of a cosmetic nature; or · Request for advice or guidance. As Agreed
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- New clients are supported with initial on-boarding, this includes: Staff Profile Uploads, Departmental Configuration, Onsite or Offsite training and the necessary documentation and E-Learning
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- Option 1: SQL.CSV export Option 2: Flat File data migration
- End-of-contract process
- 6 Months notification of the end of contract No additional cost to end of contract
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The mobile application is a slimmed down version of Visiontime Version 7.2 designed to fit within the iOS standards and Android Standards
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Standard validation banner pop up messaging
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- During the implementation process for every client, we place a strong emphasis on rigorous interface testing. This meticulous approach ensures the service interface functions flawlessly, exceeding "standard" expectations and delivering an exceptional user experience. We leverage a robust testing framework to identify and rectify any potential issues, guaranteeing a seamless interaction for all users.
- API
- Yes
- What users can and can't do using the API
- Our API is developed using a close API
- API documentation
- No
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- We insure that the OS Environment adheres to Microsoft protocols best practice standards
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Reporting data extraction in 3 formats: MS Excel PDF MS Word
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Actual SLA achievement for the Service Level shall be calculated each month in accordance with the following formula: Service Availability = (Service Hours in Month – Service Downtime in Month) x 100 Service Hours in Month Service downtime is defined as the time where not one user is able to access the system. Total Service Downtime excludes: Planned maintenance Scheduled Interruptions Downtime caused by the Clients ICT environment Downtime caused by failure of a utility service or stoppage e.g. broadband internet stoppage Time outside of service hours Total Service downtime includes Extended service hours
- Approach to resilience
- FlexTime is the sole developer and distributor of VisionTime (VT) Web software. VT Web interface is designed using the latest .NET (Visual Studio) framework applications and tools. The database back end is also designed solely by FlexTime using Microsoft SQL Server database schema technologies (MSSQL 2012 Standard). FlexTime is a fully Microsoft certified organisation therefore all web/database applications are designed solely using Microsoft technologies. VT software version(s) are released quarterly via the clients change management process ensuring all new features, bug fixes and client functionality requests are implemented within any new version release. Client notification of any new release is deployed via FlexTime website www.flextime.ie and/where necessary individual support notification to client/Operator refereeing same.
- Outage reporting
- - Email Alerts - Client Helpdesk Notification
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Flextime restricts staff level access based upon active/inactive mode or licence limitations based on staff roles within the organisation.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- MultiTime adhere to a comprehensive information security framework designed to safeguard user privacy and data integrity. This framework incorporates industry best practices such as access control, data anonymization, vulnerability management, logging and monitoring, and a robust incident response plan.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Baseline Establishment: This involves defining a secure and approved golden configuration for all critical systems.
Change Request and Approval: A formal process is implemented for requesting, reviewing, and approving any proposed changes to the system configuration. This ensures proper evaluation of potential security risks before changes are implemented.
Implementation and Documentation: Approved changes are implemented in a controlled and documented manner.
Verification and Testing: Following implementation, thorough testing is conducted to verify the change functions as intended and hasn't introduced any security vulnerabilities.
Version Control and Rollback: A version control system tracks configuration changes over time. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Identification: Regularly scan systems and applications to identify potential weaknesses (vulnerabilities).
Prioritization: Analyse vulnerabilities based on severity, exploitability, and potential impact to prioritize remediation efforts.
Remediation: Implement patches, updates, or other controls to address the vulnerabilities.
Verification: Validate that the remediation efforts were successful and the vulnerabilities are no longer exploitable.
Reporting: Track and report on identified vulnerabilities, remediation progress, and overall security posture. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Constant vigilance: Security tools and processes are used to continuously collect and analyse data from various sources like logs, network traffic, and user activity.
Identifying threats: The collected data is compared against known indicators of compromise and threat intelligence to identify potential security incidents before they happen.
Proactive defence: By detecting threats early, organizations can take preventive actions to mitigate damage, such as blocking malicious traffic or isolating compromised systems. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Preparation: This involves establishing clear policies and procedures for handling security incidents
Detection and Identification: The goal here is to promptly identify and report any potential security breaches.
Containment and Mitigation: Once an incident is detected, swift action is crucial to minimize damage. This might involve isolating infected systems, restricting user access, or shutting down specific services.
Eradication and Remediation: After containing the incident, the focus shifts to eliminating the root cause and fixing any vulnerabilities that allowed the breach to occur.
Recovery and Post-Incident Review: The final stage involves restoring affected systems and data to a functional state
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Public Services Network (PSN)
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Our core social values focus on:
Employee Wellbeing: We believe flexible work fosters a healthy work-life balance, leading to happier and more productive employees.
Diversity and Inclusion: Flexible work schedules cater to diverse needs and working styles, promoting a more inclusive work environment.
Sustainability: By reducing reliance on traditional office commutes, flexible work can contribute to a more sustainable future.
Business Growth: We see flexible work arrangements as a win-win, fostering employee satisfaction and ultimately contributing to business success.
Pricing
- Price
- £2.54 to £4.93 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Our free versions are customised depending on the client's current challenges when managing their Flexible working policy. The time limit is dependant on the type of organisation and scale of the project.