Flax & Teal Limited

Open Source Cultural Heritage Management Platform

We provide hosted instances of the Arches® platform, an open-source data management tool for the heritage sector. The enterprise-level software was designed by the Getty Foundation and the World Monuments Fund based for improved data management to support effective heritage conservation and management (F&T is unaffiliated to either body).

Features

  • ready-made and logically structured resource models
  • monitoring and risk mapping
  • input, edit, and search data for preservation
  • tile server to manage geospatial imagery
  • security controls according to individual implementation requirements
  • compatible with desktop GIS applications
  • CIDOC CRM default
  • mobile data collection companion app
  • configurable to specific geographic, cultural, and administrative contexts
  • Arches Designer facilitates the creation of new resource models

Benefits

  • automatically upload data from Collector app to platform
  • limit access to data based on individual or group permissions
  • customise resource models to the data-field requirements of your organization
  • share resources for enhancements and maintenance
  • monitoring and risk mapping on-site and offline
  • migration to other systems
  • establish numerous and complex relationships between resources
  • multi-layered access to resource information

Pricing

£500.00 to £5,000.00 an instance a month

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at phil.weir@flaxandteal.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

4 6 4 2 4 0 1 8 6 7 7 3 1 2 8

Contact

Flax & Teal Limited Phil Weir
Telephone: +442030950574
Email: phil.weir@flaxandteal.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
None
System requirements
Internet connectivity (except for offline use)

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Within 2 working days (as basic support)
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Basic email support is available.
Additional levels are currently offered, from £400-£1700/m (see pricing document), although levels including specific on-going agreements providing shorter turnaround times, on-site support and engineer support may be established on demand.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Additional costed onsite training, remote training and support is available, supplementing the extensive free resources and documentation provided by the Arches community.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Most data may be extracted via API, although a full data export of the tenant's database can be provided to ensure comprehensive access to all content.
End-of-contract process
Log-in access to the service is suspended. A complete archive of user-owned data at the time of termination will be provided on request, as a free service, for up to 60 working days after termination. All user content will subsequently be deleted, except as required for regulatory purposes.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Desktop service is optimal for management and administrative usage.
Mobile service includes app, with certain offline functionality.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
The service interface provides views and interactive tools for map-based and time-based search and inventory, semantic data management and exploration. Multi-level access control is available to provide real-only and partials views for guest users (if desired), researchers and third-parties as well as internal and administrative users.
Accessibility standards
None or don’t know
Description of accessibility
Certain ARIA techniques are used, providing some support for assistive technology and searching, although usability of certain user-uploaded media types and map-based usage may be affected.
Accessibility testing
None currently.
API
Yes
What users can and can't do using the API
Users can add their own API token to the service and make alterations to resources, as well as retrieving geospatial data.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
As an open source product, any features may be customised in line with the AGPL open source license. These customisations can be actioned by us as a supplier to you as a tenant customer, by you as a customer, or by third-parties chosen by you, within or external to the Arches community.

Customisations may include incorporation of open source plugins already existing (such as virtual tours or 3D models), as well as migrations and integrations with existing software, standards (such as MIDAS) or schemas (such as LIDO).

Scaling

Independence of resources
Our standard set-up is full multi-tenancy, which ensures that infrastructure can be separately managed and scalably resourced within our clusters as standard, or as a costed service, in a separate cloud environment.

Analytics

Service usage metrics
Yes
Metrics types
Google Analytics integration is available alongside basic usage information.

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Arches open source community

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Less than once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Export of data to CSV and Shapefiles can be performed through the interface. Comprehensive database exports can be provided on request.
Data export formats
  • CSV
  • Other
Other data export formats
  • Shapefiles
  • SKOS
Data import formats
  • CSV
  • Other
Other data import formats
  • Shapefiles
  • Custom formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
SLAs incorporating availability are available, with billing discounts for uptime below 99% and 99.9%. Individually negotiated agreements may incorporate higher percentage uptime and analysis-completion times.
Approach to resilience
In addition to the standard provisions of the Azure, AWS and GKE infrastructure used, the service has been designed to be rapidly deployable onto new infrastructure, with infrastructure definitions and code held on a separate service to the production deployment.
Outage reporting
As part of a negotiated SLA, high priority (or automatic) email notification may be agreed - otherwise by email and website updates.

Identity and authentication

User authentication needed
No
Access restrictions in management interfaces and support channels
For accessing any restricted material or administrative interfaces, authentication is required, and administrators can disable any guest usage. Support software implements authentication via browser.
Access restriction testing frequency
Less than once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Assigned person within the organization registered with ICO and responsible for adherence to DPA legislation and other security best practices. Required sensitive information is kept extremely limited, to minimize liability.
Information security policies and processes
The director, acting as CISO, is directly responsible for acting on reported security issues and initiating remedial work. Others involved in performing work on the system do not require, and will not be provided with, access to live sensitive data, except in exceptional circumstances, with appropriate policy precautions

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All components of the service are tracked using industry standard distributed version control. Build versions of compiled components are tracked through container image hashes. Infrastructure is defined in code and tracked using industry standard version control. Changes are assessed for security impact through peer-reviewed merge requests by experienced practitioners.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Potential threats are primarily assessed through exploration by experienced members of the team who file security issues. Services will be patched as soon as appropriate: where risk and impact of a vulnerability allows, additional investigation time will be provided to ensure new security measures do not lead to regressions or overall security degradation. Threat information is primarily gathered through industry links
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Compromises are identified primarily through unusual traffic or access attempts. Improvements to automation of compromise analysis is part of this process. All affected users will be notified of the scale and impact of any compromise as initial analysis is complete.
Incident management type
Undisclosed
Incident management approach
Serious incidents are escalated to the director immediately, who is directly responsible for setting strategy and overseeing response. For certain standard events, such as denial of service attacks, use may be restricted to subscribed users or, in extreme cases, further based on SLA conditions; high availability ingresses will be scaled up and, if necessary, new infrastructure deployed. In general, all affected users will be notified of the incident and outcome and, where appropriate, information will be made public via the website.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Improved understanding of data will help enhance environmental efficiency - we have worked with NI Department of Infrastructure (comm. sens) to find potential optimisations in their open data. This led us to help identify records needing checking on certain street assets, which could be built into a more efficient cleaning and upkeep rota - in future, this could make maintenance more energy- and environmentally-efficient. We would be keen to explore such opportunities with geospatial heritage datasets, by combining data sources in new ways. Our team are actively working on a schools project that incorporates open data into human geography learning around climate change and environmental impacts HERoNI datasets (since its first iteration in 2016, built with input from CCEA and OpenDataNI). This platform is now being used for community work around disasters in Nepal (Feb 2022) and education in Saudi Arabia (2020-21), and was part of a COP26 presentation. Aside from re-use of data, the open source infrastructure we created and use for deploying data cleansing analytics is shared with this project, so work conducted here can be shown to quantifiably have an impact on our resilience, educational and environmental projects in the rest of the world.
Tackling economic inequality

Tackling economic inequality

Within this work, we would be keen to reach out to the Arches global community to help share learning and code (where appropriate) - being open source, Arches has no vendor-driven financial or transparency barriers to use, and so we have used it for technical community events, including in 3D/VR. In particular, it is used in a number of countries where expensive global service contracts are not viable, but technical skills exist - Arches was specifically initiated as a project by the Getty Institute and World Monuments Fund to help address those inequalities, and the initial project implementing Jordan’s national heritage database is an example of that globally inclusive approach. Relevant work done on Arches in HED’s project (and contributed back to Arches) would therefore contribute directly to UN-SDGs.

Pricing

Price
£500.00 to £5,000.00 an instance a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Access to a shared demonstration instance for up to one month on infrastructure for up to 2 users (no uptime, data ringfencing or guarantees included). For a nominal charge, a temporary demonstration instance will be provided on shared infrastructure, for private testing.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at phil.weir@flaxandteal.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.