Electronic Pocket Notebook
Electronic Pocket Notebook digitizes the traditional paper notebooks allowing users to record on a digital device text, images, sketches and voice recordings using the devices touch pad, input device or voice recording. Interface into back office systems recording date, time and geo-location of entry. Provides team functionality and desktop access.
Features
- Redacted PDF statements from Desktop
- All entries are geo-location stamped plus date and time
- All mobile back office system activity is recorded
- Operates on Android, UWP and iOS via SaaS, on-premise
- One entry can be share or remain private
- Secure audit trail provided
- Access to historical entries
- Internal affairs can view entries without leaving a footprint
- Operates online and offline mode
- Interface to MS Exchange or Azure for internal group structures
Benefits
- All entries recorded are updated to central database
- Entries cannot be altered nor deleted by the user
- Content equal to paper pages cannot be removed
- Entries are immediately available to be shared once entered
- Interfaces to existing system with api's
- Application can be enhanced by the customer
- Small data storage required for multiple users
- Single user access available to be accessed on multiple devices
- Audit trail is available for internal analysis
- Operates on a hierarchical structure
Pricing
£9.99 to £19.99 a person a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 9 4 2 3 9 2 5 2 1 8 4 0 8 7
Contact
Xenium Solutions Limited
Bruce Murchie
Telephone: +447802227837
Email: brucem@xeniumsolutions.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- The system can be used stand alone or interface into an existing environment. Interface available via api's to existing customers back office systems for two way data transfer.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- We do not see any service constraints given that the environment is operating on current technology and services.
- System requirements
-
- Any mobile device that supports UWP, iOS or Android
- Any iOS or UWP desktop
- Operates cross boarders
- Can be multilingual input
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Support is provided depending upon the urgency of the related issue but usually responded to within the same working day where possible
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- There is no limitation to what can be completed via the web chat service
- Web chat accessibility testing
- With existing customers across the UK
- Onsite support
- Onsite support
- Support levels
- Customers pay an annual support and maintenance for on-premise or its included for SaaS that entitles the customer to virtual support. Onsite support is chargeable.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- The system is intuitive to be able to use as we are usually replacing an existing paper based solution. Training is provided via train the trainer.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data is stored separately from the application.
- End-of-contract process
- The customer at the end of the contract would cease to be able to access the application to use.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The same functionality is made available to the mobile as well as the desktop user with the exception of mobile printing that would require interfaces to be created to provide this functionality
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Api's are made available according to the interface that the customers needs to provide on the mobile devices.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Most of the system is customisable, if not all of it.
Scaling
- Independence of resources
- A sizing exercise would be completed prior to the engagement of the live system with the customer.
Analytics
- Service usage metrics
- Yes
- Metrics types
- The database can be access through tool sets like PowerBI to determine usage metrics
- Reporting types
-
- API access
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- A number of organisations. Please contact for specific details.
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Using any SQL export tool set
- Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- We have managed 99.9% uptime to date. The guarantee is provided by the hosting organisation or the customers internal cloud based solution
- Approach to resilience
- Available on request
- Outage reporting
- Whatever the hosting company makes available
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Defined by the customer
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- DigitalXRaid
- ISO/IEC 27001 accreditation date
- Marh 2020
- What the ISO/IEC 27001 doesn’t cover
- Due to the size of the code base, a penetration test was completed
- ISO 28000:2007 certification
- Yes
- Who accredited the ISO 28000:2007
- DigitalXRaid
- ISO 28000:2007 accreditation date
- March 2020
- What the ISO 28000:2007 doesn’t cover
- Due to the size of the code base a penetration test was completed. Regarding the supply chain, the code was evaluated as supplied by the developers
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Those that are necessary to meet the needs of the customer
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Change management processes are completed in conjunction with the customer who becomes the driving force in such matters.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We have our systems tested annually and for the delivery channel that is a matter for the service provider where we manage the controls in conjunction with the customers needs.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Systems are managed through the use of a range of environment that have been implemented covering testing, pre production, training and live deployment. As each of these systems are a mirror of each other as the internal and external monitoring is progressed so are the potential issues identified.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Web based system with direct communication between the customer and the development team
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- NHS Network (N3)
- Joint Academic Network (JANET)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Paper has been replaced with a digital solution thus eliminating the need for one time paper products that where used and then needed to be stored.
Pricing
- Price
- £9.99 to £19.99 a person a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Access to an operating system for one month or as agreed
- Link to free trial
- Available on request