Skip to main content

Help us improve the Digital Marketplace - send your feedback

NEO TECHNOLOGY LIMITED

Powered by Neo: Regular Visit for Temporary Housing Solution

Neo Technology's Temporary Housing Regular Visit solution optimises the management of temporary housing units by facilitating routine inspections. Utilising our robust case management system, the solution streamlines scheduling, data collection, and reporting processes, ensuring efficient and effective management of temporary housing facilities.

Features

  • Automated scheduling of regular housing inspections
  • Mobile app for convenient data collection on-site
  • Customisable inspection checklists to suit specific requirements
  • Real-time access to inspection data for stakeholders
  • Integration with existing housing management systems
  • Reminder notifications for upcoming inspections
  • Secure cloud storage for inspection records
  • Comprehensive reporting features for analysis and compliance
  • Multi-platform accessibility for inspectors and administrators
  • Scalability to accommodate varying inspection volumes.

Benefits

  • Increased efficiency in scheduling and conducting inspections
  • Enhanced accuracy and consistency in data collection
  • Improved compliance with regulatory standards and housing policies
  • Time-saving through automation of administrative tasks
  • Better transparency and accountability in inspection processes
  • Reduced paperwork and manual data entry errors
  • Faster identification and resolution of housing issues
  • Improved communication among stakeholders
  • Streamlined workflow for housing management teams
  • Enhanced resident satisfaction through proactive maintenance measures.

Pricing

£2 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at stuart.payne@neotechnologysolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 9 8 7 9 9 5 6 8 3 7 7 9 2 4

Contact

NEO TECHNOLOGY LIMITED Stuart Payne
Telephone: +447719169415
Email: stuart.payne@neotechnologysolutions.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
This solution can be integrated with other applications and for holistic property management solution is also available as part of Neo Technology's property Management Solution “Propsys 360”.

Alternatively, it can function independently to address specific related challenges.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Neo's solution offers robust features for tenants, staff and properties, constraints may include compatibility limitations with certain legacy systems and custom integration requirements based on unique business workflows.
System requirements
  • Operating system compatibility
  • Minimum hardware specifications
  • Database management system requirements
  • Internet connectivity
  • Security protocols and encryption standards
  • Integration APIs and compatibility with third-party systems
  • Scalability and performance benchmarks
  • Backup and disaster recovery mechanisms
  • User authentication and access control requirements
  • Software update and patch management procedures.

User support

Email or online ticketing support
Email or online ticketing
Support response times
We offer both email and online ticketing support to ensure comprehensive assistance for our users.

Our email support allows users to reach out with inquiries, issues, or feedback directly via email, providing a convenient communication channel.

Additionally, our online ticketing system enables users to submit support requests and track their status efficiently. With our ticketing system, users can log their issues, receive timely updates on their resolution progress, and communicate with our support team seamlessly.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
We offer web chat support for quick help. We've tested it to ensure it works well with tools like screen readers. We want everyone, including people with disabilities, to use our chat easily and get the help they need.
Onsite support
No
Support levels
On call support can be provided 24hrs, seven days a week, as required and agreed with the client.

All clients have resources, based on support framework required.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We offer a variety of resources to assist users in getting started with our service.

This includes comprehensive user documentation available online, covering all aspects of setup, configuration, and usage.

Additionally, we provide online training sessions and tutorials for users to familiarise themselves with the platform at their own pace.

For those who require further assistance, we offer onsite training sessions conducted by our expert team to ensure a smooth transition and effective utilisation of the service.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Word Document
End-of-contract data extraction
At the end of the contract, users can extract their data through a streamlined process facilitated by our platform. We provide tools and mechanisms within the system that allow users to export their data in standard formats such as CSV or Excel. Additionally, users have the option to request assistance from our support team for data extraction, ensuring a smooth transition and compliance with data privacy regulations.
End-of-contract process
At the end of the contract, several processes are initiated. Firstly, there's a review of the services rendered during the contract period, ensuring all deliverables are met. Depending on the agreement, there may be discussions regarding contract renewal or termination.

Regarding pricing, the contract typically includes core services specified in the agreement. Additional costs may apply for extra features, customisations, or services beyond the scope of the standard package. This is clarified in the contract terms and can be discussed with the account manager.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
  • Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Our service has been specifically designed to work on mobile devices, ensuring a seamless user experience across different platforms. While the core functionality remains consistent between mobile and desktop versions, there are some differences in layout and interface to optimise usability on smaller screens.

For instance, menus and navigation may be simplified or reorganised for easier access on mobile devices. Additionally, certain features may be optimised or adjusted to accommodate the unique characteristics of mobile interactions, such as touch gestures and screen size constraints.

Overall, our goal is to provide a consistent and user-friendly experience across all devices.
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
Through the interface, users can access and manage various features and functionalities offered by our service.

This includes tasks such as configuring settings, managing data, and accessing support resources. The interface is designed to be user-friendly and intuitive, facilitating efficient navigation and interaction for users of all levels of expertise.
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
We've conducted interface testing with users of assistive technology to ensure accessibility and usability for all individuals.

This testing involved individuals with diverse needs, including those using screen readers, magnifiers, alternative input devices, and other assistive technologies.
API
Yes
What users can and can't do using the API
Our service provides an API for seamless integration with other systems and applications.

Through our API, users can perform a variety of tasks such as retrieving, creating, updating, and deleting data programmatically. This includes accessing user information, managing resources, querying data, and initiating automated workflows. However, certain administrative functions may be restricted via the API for security reasons, such as user authentication and authorisation settings.

Additionally, while the API offers extensive functionality, some complex operations or system configurations may require direct interaction with our platform's user interface.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Users can customise our service to tailor it to their specific needs and preferences. Customisation options allow users to personalise their experience according to their requirements, preferences, and workflow.

This includes adjusting settings, configurations, and layouts to align with individual preferences. Users with appropriate permissions can access customisation features, ensuring that adjustments are made by authorised individuals based on their roles and responsibilities within the organisation.

Scaling

Independence of resources
To ensure independence of resources, we employ robust resource isolation techniques within our infrastructure. Each user's workload is allocated dedicated resources, including compute, storage, and network capacity, preventing resource contention and ensuring consistent performance.

Additionally, we implement dynamic scaling mechanisms to automatically adjust resource allocation based on demand fluctuations, maintaining optimal performance levels even during peak usage periods.

Continuous monitoring and proactive capacity planning further safeguard against resource exhaustion, guaranteeing that users remain unaffected by the demand placed on by others, ensuring a seamless and reliable user experience.

Analytics

Service usage metrics
Yes
Metrics types
We provide comprehensive service usage metrics through multiple channels for user convenience. Users can access real-time usage data programmatically via our API or through interactive dashboards within the platform.

Additionally, scheduled reports offer regular insights into service usage trends, ensuring continuous monitoring and analysis.

For more specific insights, users can request customised reports tailored to their requirements. This approach ensures that users have access to the information they need to make informed decisions about their usage of the service.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users can export their data through a straightforward process provided within the platform. Typically, there's an option within the user interface allowing users to select the data they want to export and choose the desired format. The system then initiates the export process, generating a downloadable file containing the selected data. Additionally, users may have the option to schedule automated data exports or request assistance from customer support if needed.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We guarantee a high level of availability for our service, typically backed by service level agreements (SLAs) that outline specific uptime targets.

These SLAs often specify the percentage of time the service is expected to be available within a given period, such as 99.9% uptime annually.

In the event that we fail to meet these guaranteed levels of availability, users may be entitled to refunds or credits, depending on the terms outlined in the SLA.

Our goal is to ensure that users experience minimal disruptions and can rely on our service to meet their needs consistently.
Approach to resilience
Available on request.
Outage reporting
We'll ensure you're promptly notified of any service outages via email. For enhanced monitoring, we also offer real-time dashboards, providing immediate visibility into service status. Additionally, we provide access to APIs, allowing seamless integration with your systems for outage reporting.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
We enforce strict access controls to ensure that only authorised personnel can access management interfaces and support channels.

This includes implementing role-based access control (RBAC) to limit permissions based on user roles and responsibilities.

Additionally, we utilise strong authentication mechanisms such as multi-factor authentication (MFA) to verify the identity of users before granting access.

Access to sensitive data and administrative functions is further restricted through network segmentation and encryption protocols. Regular audits and monitoring are conducted to detect and address any unauthorised access attempts promptly.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Adoptech
ISO/IEC 27001 accreditation date
10/01/2024
What the ISO/IEC 27001 doesn’t cover
Compliance with industry-specific regulations or standards not explicitly covered by ISO/IEC 27001.

Security practices of third-party vendors or partners not directly under our control.

Aspects of security related to emerging technologies or evolving threats not explicitly addressed in the ISO/IEC 27001 standard.

Internal policies and procedures not directly related to information security management.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We adhere to robust information security policies and processes to safeguard your data. These include measures such as encryption protocols, access controls, regular security audits, and compliance with industry standards like ISO 27001.

Additionally, we implement stringent authentication methods, conduct employee training on security best practices, and maintain a proactive approach to identifying and mitigating potential security risks.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We closely track all parts of our services from the moment they're created until they're no longer needed. When we make any changes, we carefully check them to see if they might cause security issues.

We test everything thoroughly before making the changes to ensure they won't cause any problems. We follow the best practices in the industry and use systems to keep track of different versions of our services, so everything stays organised and secure.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We regularly assess our services to identify any potential weaknesses or threats.

Once identified, we swiftly deploy patches or fixes to address these vulnerabilities.

We stay informed about potential threats from various sources, including security advisories, industry forums, and threat intelligence feeds. Our goal is to proactively address any vulnerabilities to ensure the security and integrity of our services
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Our protective monitoring processes involve continuous monitoring of our systems and networks to detect any potential security breaches or compromises.

When a potential compromise is identified, we have established protocols to promptly investigate the incident and take necessary actions to mitigate the threat.

Our goal is to respond swiftly and meet agreed SLAs to any incidents to minimise the impact and protect the integrity of our services and data.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Users can report incidents through designated channels, such as our support portal or email. Upon receiving a report, our team investigates the incident promptly and communicates updates to users as necessary.

After resolving the incident, we provide detailed incident reports outlining the cause, impact, and actions taken to prevent recurrence, ensuring transparency and accountability in our incident management approach.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Cloud computing helps fight climate change by using less energy and reducing emissions. It does this by making data centres more efficient, so they use less power.

Cloud services also let people work from home more, so there's less pollution from commuting.

Overall, cloud computing is making it easier for everyone to help the planet.

Tackling economic inequality

We prioritise initiatives that promote economic inclusivity, such as providing opportunities for small and local businesses to participate in our supply chain.

Additionally, we offer flexible pricing models and discounts to ensure affordability for organisations with limited resources.

Equal opportunity

Our service promotes diversity and equal access to opportunities. We actively engage with underrepresented groups, including minority-owned businesses and marginalised communities, to ensure their voices are heard and their needs are met.

Furthermore, our recruitment and training practices prioritise diversity and inclusion.

Wellbeing

We prioritise the wellbeing of our employees, customers, and communities. Our service offerings include features designed to enhance mental health and work-life balance.

We also support employee volunteer programs and community initiatives aimed at improving overall wellbeing.

Pricing

Price
£2 a user a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at stuart.payne@neotechnologysolutions.com. Tell them what format you need. It will help if you say what assistive technology you use.