Permit to Work Software
EcoOnlines Permit to Work (PTW) software allows users to quickly and easily create, request and manage permits for all manner of hazardous works. All stakeholders in the work are given visibility on permit content, facilitating better communication and safety control across your team and contractors.
Features
- MAINTAIN AND MANAGE: Easily track permit creation and updates
- PERMISSIONS: Choose who can issue, review and authorize permits.
- FULL PICTURE: Attach risk assessments and method statements to permits
- PERMIT EXTENSIONS: Extended permits link back to the original documents.
- HANDBACK/CANCEL: Handback permits for completed work or cancel if incomplete
- MULTILINGUAL: PTW System is available in multiple languages
- PERMIT QUESTIONS: Create your own safety precaution questions
- MULTI-PERMITS Ability to combine multiple permits into one record
Benefits
- Easy-to-use permit to work (PTW) management
- Eliminate excess paperwork and improve your handover process
- Choose from General and Specialist permit templates
- Simple checklist process encompasses all associated safety checks and precautions
- Have complete control over permit issuance and approval
- Send your permits through several stakeholders for review and sign-off
- Gain an oversight of all permit related information
- Quickly view Open, Overdue and Specialist Permits
- Notify reviewers by email when permits are up for authorization
- View what changes were made to permits and by whom
Pricing
£240 to £2,000 a user a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 8 1 1 9 5 1 5 9 6 7 8 5 2 7
Contact
EcoOnline
Bid Team
Telephone: 01926 844 200
Email: bidteam@ecoonline.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- EcoOnline EHS
- Cloud deployment model
- Private cloud
- Service constraints
- Up to date internet browser
- System requirements
-
- Web browser (no special plug-ins required)
- Network access
- Apple or Android phone (for the Mobile App)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Support hours are Monday to Friday 9:00am to 5:30pm
Priority 1 - Major Defect - Within two (2) business hours.
Priority 2 - Critical Defect - Within four (4) business hours.
Priority 3 - Non-Critical Defect - Within twelve (12) business hours.
Priority 4 - Error - Within twenty-four (24) business hours. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Priority 1 - Major Defect
The entire Software Service is “down” and inaccessible to all Authorised Users. Priority 1 incidents shall be reported by telephone only.
Response Time : Within two (2) business hours.
Target resolution time : Eight (8) business hours. Continuous effort after initial response and with Client co-operation.
Priority 2 - Critical Defect
Operation of the Software Service is severely degraded, or major components of the Software Service are not operational, and work cannot reasonably continue. Priority 2 incidents shall be reported by telephone only.
Response Time : Within four (4) business hours.
Target resolution time : Within two (2) business days after initial response.
Priority 3 - Non-Critical Defect
Certain non-essential features of the Software Service are impaired while most major components of the Software Service remain functional.
Response Time : Within twelve (12) business hours.
Target resolution time : Within fifteen (15) days after initial response.
Priority 4 - Error
Errors that are non-disabling or cosmetic and have little or no impact on the normal operation of the Software Service.
Response Time : Within twenty-four (24) business hours.
Target resolution time : Next Maintenance Event. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- The EcoOnline professional services team will provide a full setup of the EcoOnline system which comprises of onsite visits to understand the businesses requirements and objectives, User Acceptance Tests (UATs) and product delivery/roll-out. Built-in online help and documentation is provided coupled with classroom based train the trainer sessions.
- Service documentation
- No
- End-of-contract data extraction
- EcoOnline EHS has a built-in export function to extract data on a module by module basis. However when leaving a platform like EcoOnline users usually requires large volumes of data and some form of re-structuring which is done upon their instruction.
- End-of-contract process
- Upon contract termination EcoOnline will act on the clients behalf to extract their data and structure in a format required. Depending on the amount of data and re-structuring will dictate the cost at our standard day rate.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The service is responsive and so will look different on some mobile browsers Vs a desktop browser
As well as being available on mobile browsers the service also has a dedicated mobile App available for Apple and Android devices - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Yes, we have APIs or can offer direct access to a replica of our DataWarehouse which is a Microsoft SQL Server instance.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- As a best-practice solution, huge considerations have been made to ensure that our software is as feature rich as it is easy to use. Customisable forms and workflows, as well as flexible data relationships make the software highly configurable. Configuration is managed partly by our professional services team, but in the main it is managed by the clients system administrator(s)
Scaling
- Independence of resources
- EcoOnline monitor the compute resources, in real-time, and increase if needed.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Metrics types
On request EcoOnline will provide the average and peak login concurrency on the system.
Reporting types
Reports on request - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can either export at the module level from the user interface or contact Safety Software to make a complete export of the data.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.5%
- Approach to resilience
- Detailed information available upon request. EcoOnline is hosted only in world-class datacentres holding appropriate internationally-recognised accreditation and certification for their operations, security and resiliency.
- Outage reporting
- Nominated contacts are informed should there be a service outage.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Only named personnel have access to the management interface and given authority to communicate with the support channel.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- SGS UK Ltd
- ISO/IEC 27001 accreditation date
- 10/02/2014
- What the ISO/IEC 27001 doesn’t cover
- 111 of the 114 controls in the 2013 standard are applicable to us. The following are not applicable: A.9.4.4 Use of privileged utility programs; A.11.1.6 Delivery and loading areas; A.14.1.3 Protecting application services transactions.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We hold ISO/IEC 27001:2013 certification which was gained from a UKAS accredited certification body. It is the specification for an Information Security Management System (ISMS).
The Company will:
- Comply with all applicable laws, regulations and contractual obligations;
- Implement continual improvement initiatives, including risk assessment and treatment strategies, while making the best use of its management resources to meet and improve information security system’s requirements;
- Adopt an information security management system (ISMS) comprising of a security manual and procedures that provides direction and guidance on information security matters relating to employees, customers, suppliers and interested parties who come into contact with the Company’s work;
- Work closely with their Customers, Business Partners and Suppliers in seeking to establish Information Security Standards;
- Adopt a forward-looking view on future business decisions, including the continual review of risk evaluation criteria, which may have an impact on Information Security;
- Train all members of staff in their needs and responsibilities for Information Security Management;
- Constantly strive to meet, and when possible exceed, its customers and staff expectations.
- Communicate its Information Security objectives and its performance in achieving these objectives, throughout the Company and to interested parties.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- The organisation has policies and procedures in place pertaining to Annex A.12.1.2 Change management of ISO/IEC 27001:2013 and these are audited by our UKAS accredited certification body annually.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- The organisation has policies and procedures in place pertaining to Annex A.12.6.1 Management of technical vulnerabilities of ISO/IEC 27001:2013 and these are audited by our UKAS accredited certification body annually.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- The organisation has policies and procedures in place pertaining to Annex A.12.1.3 Capacity management of ISO/IEC 27001:2013 and these are audited by our UKAS accredited certification body annually.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- The organisation has policies and procedures in place pertaining to Annex A.16 Information security incident management of ISO/IEC 27001:2013 and these are audited by our UKAS accredited certification body annually.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Due to the high degree of flexibility built into all of our software in can be used not just for Health & Safety, but for also for Environmental management.
The Permit to Work module can be used to ensure permits are only issued when the environmental requirements/standards of your organisation are met. - Wellbeing
-
Wellbeing
Due to poor health and safety, millions of workdays are lost due to work-related ill health and non-fatal workplace accidents.
We know that a lot of the occupational diseases and accidents could be avoided by increasing knowledge and easy to use information systems that helps companies identify, track, and eliminate risk at work.
Still, year on year an unacceptably high number of people work in unsafe and unhealthy work environments. Placing needless costs on the employees, the businesses, and the environment.
We must ask ourselves why? Why with all the information and guidelines available do we continue to have workplace incidents?
To break this paradox, EcoOnline are passionate about developing user-friendly digital software that improves the flow of information and streamlines all documentation needed to reduce risks due to factors in the workplace.
At EcoOnline we use innovative technology to help our clients build a deeper understanding of their operational and EHS risks. By designing EHS software with ease of use at its core, we lower the barrier so that anyone can report incidents, near misses or other important events – wherever they are.
We use data captures and connect these to drill down into the root cause of the incidents, risks, or emissions. Through easy to use and understand dashboards everyone can take a role in spotting trends, corrective actions and contribute to protect employees, contractors, customers, and the public.
Pricing
- Price
- £240 to £2,000 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We offer a free workshop where EcoOnline will come in and sit down with the prospect and work through a training program with them. Following this workshop a demo system will be made available for a short trial period.