Employee Voice by Hive

Hive is an employee voice platform and partnership. Our employee / staff engagement surveys, confidential employee feedback tools and expert people scientists help organisations amplify employee voice, improve staff engagement, gather insightful employee feedback, create a better employee experience and improve organisational performance.


  • Flexible, automated and real-time employee voice platform
  • Powerful reporting: sentiment analysis, heatmaps, benchmarking & eNPS
  • Expert, strategic and fully tailored People Science support
  • Flexible staff surveying: ask what you want, when you want
  • Targeted demographic surveying with targeted campaigns
  • Hive Fives: peer-to-peer recognition to drive culture and values
  • Hive Open Door: always-on channel for employees to speak up
  • Hive Messenger: respond to feedback through identity-protected virtual chats
  • SMS text participation, language translation, data export and more
  • Dedicated support teams and customer community


  • Measure, understand and improve employee engagement on an ongoing basis
  • Ask your people the right questions, at the right times
  • Get actionable insights in real-time—less admin, more impact
  • Equip managers with timely insights to drive agile decision-making
  • Empower employees with a permanent voice
  • Drive culture and values through ongoing peer-to-peer recognition
  • Respond to employee feedback directly and quickly
  • Continually engage your workforce in organisational change
  • Drive high response rates through easily accessible, online surveys
  • Build a culture of listening, inclusivity and engagement


£7,000 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

4 7 9 9 1 7 0 0 4 7 5 0 8 0 0


Hive Donna Petrie
Telephone: 0333 305 8471

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
The user must have hardware capable of running the latest browser versions, as detailed in our system requirements.
System requirements
  • Chrome (latest)
  • Firefox (latest)
  • Safari 9+
  • Edge (latest)

User support

Email or online ticketing support
Email or online ticketing
Support response times
6 hour case assignment SLA for priority 3 (general query) and 2 (partial system outage) cases and 2 hour SLA on priority 1 cases (full system outage). 48 working hour resolution for priority 2 and 3 cases and 4 hour for priority 1
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Web chat support
Onsite support
Yes, at extra cost
Support levels
Access to product documentation and Hive support team is provided to all contracted customers as standard. The Product support team are there to answer technical queries about the platform, Monday - Friday between the hours of 9am - 5pm. They can be contacted through the help centre, support email address or support telephone number. This includes unlimited number of cases raised to the support team, in-accordance with Hive’s service level agreement.

Contracted customers who’s contract value is over £400 MRR, are also assigned a dedicated Customer Success Manager, who’s purpose is to be the direct line of contact for tactical advice, product enquiries and adoption of Hive. Customer Success support is delivered via email, phone and face-to-face meetings when required.
Support available to third parties

Onboarding and offboarding

Getting started
All of our Customers are assigned to a dedicated member of the Implementation Team who will assist with the onboarding process. Hive provide all the resources and templates needed to get started, as well as in-depth training sessions to ensure a smooth transition onto the platform. The support offered can be on-site or remote, depending on the preference of the Customer. Post-launch, our Customers receive ongoing tactical guidance, support and advice from our Customer Success team.

Our People Science team deliver strategic support in the form of training, coaching and facilitation, built around the requirements of our Customers and the needs of their key stakeholders.

Their time is focussed on supporting our Customers to introduce a new approach to employee engagement in a measured and impactful way, with considerable attention directed towards creating organisational readiness for Hive, creating confidence and momentum in driving change, and reinforcing the approach and making it stick.
Service documentation
Documentation formats
End-of-contract data extraction
Hive will provide a full data export for the customer, if requested, at the end of the contract. This document will be password protected and transferred in a secure manner.
End-of-contract process
Typical subscriptions commence with an initial 24 month term and will renew at the end of the initial contract term.

Typical subscriptions include unlimited use of the Hive platform, tailored & on-site People Science support and ongoing tactical support from our Customer Success team.

Pricing is based on number of users, along with the level of support we would expect your organisation to require.

Additional costs include further investment into People Science support (beyond what's included in your subscription), expenses (travel, accommodation and sustenance costs), SMS text survey prompts, further language translation and Creative Services (graphic design support for creative purposes).

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Employee facing pages are designed to work on any device, mobile or desktop, and we also support SMS text survey prompts (along with email).

However, the full application as used by managers/administrators is not intended for small screen devices such as mobiles at this time.
Service interface
User support accessibility
WCAG 2.1 AA or EN 301 549
What users can and can't do using the API
By integrating your HRIS into Hive, your user data will always be accurate and up to date—without you having to lift a finger.

Once integrated, any changes you make in your HRIS will be automatically replicated in our platform. So you can rest assured that everyone will receive the right invitations to have their say—allowing you to fully embrace continuous listening and Hive’s real-time feedback channels.

Once you’ve integrated, you’ll never have to manually amend your user data. So one less thing on your pre-survey to-do list, and one less system to update when something changes.

Using the workforce demographics from your HRIS, Hive will segment employee feedback to help you spot trends—giving you even more insight to answer the all-important “why?”.

We’ve got integrations set up for a number of HRIS, so all you need to do is let us know which system you use, and we can get them linked up. And if your HRIS isn’t one of those on our current list, then you can request it to be next!
API documentation
API sandbox or test environment
Customisation available
Description of customisation
The Hive platform will give you complete freedom to ask what you want, when you want, with no limitations or restrictions.

Hive support all of our customers with developing a fully customised question strategy that's tailored with the needs of your people, leaders and organisation in mind.

You can customise the categories of our recognition feature to align it with your organisational values and the categories of our Open Door feature so that you can position it in the best way possible for your organisation.

Email templates are also customisable on a per customer basis.


Independence of resources
Hive's infrastructure is based on a micro-service model, allowing us to scale easily with the demands of our users. Demands on certain parts of the application by some users do not affect those of others, due to our auto-scaling setup provided by AWS.


Service usage metrics
Metrics types
Real-time reporting dashboards will display Engagement Index, eNPS, response rates, average scores and other descriptive data about ongoing surveys
Reporting types
Real-time dashboards


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Hive administrators can export their data (survey responses, recognitions, suggestions and users) in a comma-separated value (CSV) format that can be imported into all commonly used spreadsheet software.
We are also able to provide data in a format suitable for consumption by Business Intelligence software.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our standard Service Level Agreement (SLA) document is shared with all of our Customers. We endeavour to deliver maximum uptime for our users, both internal and external, via various AWS mechanisms such as auto-scaling, health checks and alerting.
Approach to resilience
Due to the sensitive nature of this information, it is available on request as required.
Outage reporting
We have a public status page that outlines and monitors any outages or planned maintenance, available here:

Email alerts are available via the above public status page.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
We implement a Role Based Access Control (RBAC) model within the application, which allows organisations to control what users have access to specific data in a fine grained manor.

We also restrict access for support personnel to the absolute minimum amount of data required to carry our their customer support role.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
As part of our ISO27001 accreditation we have a range of policies stemming from our Information Security Management System. These policies include, but are not limited to a, Password Policy, Information Classification and Data Handling Policy, Clear Desk and Screen Policy, Secure Configuration Policy, Employee Exit Plan, Malware Protection Policy, and Firewall Policy.
Policies are reviewed regularly. We have various methods to ensure policies are complied with, including policing unlocked laptops, requiring the use of privacy guards when working remotely, conducting mock phishing attempts and audits on general awareness and compliance with the different policies.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Changes to our services all go through extensive peer review before they are released to the public. A formal change management process is adhered to when applying any significant changes to our production environments.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We maintain a Risk Register with all identified potential threats and vulnerabilities. When a threats are over a certain threshold they must be treated within a specified time frame. Any high-risk threats are patched as soon as possible on production systems in accordance with our Risk Register time frames. We gain awareness of potential threats via Privacy Impact Assessments on all third-party services in use, as well as through annual penetration tests and regular vulnerability scans.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
All production systems run TrendMicro Deep Security, which informs us and attempts to prevent any active intrusion occurring within the systems. If potential compromises within the systems become apparent, we have a documented incident management process which details the precise severity and steps to be taken. Depending on the incident severity, we have different SLAs.
Incident management type
Supplier-defined controls
Incident management approach
Informally, we know the process for common events, but do not currently have a pre-defined written document which covers these.
Users can report incidents to the support team. The support team then assess the issue to see what it should be categorised as and to assign it a priority. The relevant members of the incident response will then work together to assess and contain the issue, investigate and resolve it. Incident reports are filed, and once the issue has been fully resolved it will be raised in the next management review. Serious incidents also undergo a post-mortem

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

Covid-19 recovery

Covid-19 recovery

Tackling economic inequality

Tackling economic inequality

Equal opportunity

Equal opportunity





£7,000 a licence a year
Discount for educational organisations
Free trial available
Description of free trial
We’re able to support targeted and low-cost pilots to help introduce Hive in a strategic way within your organisation
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.