Compliance Software Solution
Our cloud-based Solution offers a straightforward, efficient, and powerful tool for managing all governance, risk, and compliance needs, including ISO standards. Our Compliance Solution combines management system integration and risk assurance software to provide the easiest path for your business to attain and uphold ISO certification.
Features
- One Compliance Solution for All ISO's
- Continuous Assistance
- Can Access Anywhere Repository and Workflow for Policies, Controls
- ISMS Manager, Control Manager, Risk Manager, Conformance Manager
- Import Data from Existing Management Systems
- Version Control and Read-Only Access
- Incident Management, Corrective Actions, and Tracking
- Document Management
- Role Based Access and Approvals
- Cloud Solution - Unlimited assets, users
Benefits
- Customized Roles, Responsibilities, and Authorities
- SWOT Analysis Template Included
- Seamless Addition of Operational Controls
- Tracking Compliance of Management Systems
- Remote Access Anytime, Anywhere
- Tailored Workflows, Alerts, and Notifications
- Personalized Dashboard Options
- Internal and External Audit Dococumentation
- Risk Logs
- GAP Analysis
Pricing
£50 to £250 an instance a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 2 8 9 0 7 7 6 7 1 4 2 0 8 4
Contact
WT DATATECH LTD
Dileep Iarala
Telephone: 07738729304
Email: dileep.iarala@memss.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No Constraints work Any Cloud service provider but Planned maintenance is typically scheduled outside of regular business hours.
- System requirements
-
- Subscription to Cloud Service
- Internet Browser
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Our Client Support group will make every reasonable effort to ensure submitted cases are assigned the proper Severity level. Submitted cases will be responded to in the order they are received, with consideration given for higher Severity levels. Response Time is the time it takes before a WT Datech Support agent makes initial contact with the individual who submitted the case. Bundled Service (Normal Priority 6 Hours, Serious Priority 3 hours, Critical Priority Live Call Only) Concierge Standard (Normal Priority 4 Hours, Serious Priority 2 hours, Critical Priority Live Call Only)
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We include support within our annual fee. We will allocate both technical account manager and cloud support engineer
Standard Support - available during 09:00 – 17:00 hours, Monday to Friday (not English Public Holidays). Incidents may be logged via the web, telephone or email during these times. Additionally, Incidents may be logged via email or the web outside of these hours, but they will not be progressed until the next working day. we also support out of hours for priority issues. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Our web-based application, designed for your convenience, is accessible from anywhere. Our onboarding process begins with a review of your business processes, mapping them to Compliance Solution functionality. We then configure the system according to your requirements and provide training tailored to your needs.
During the implementation phase, we provide comprehensive training to your core project team, ensuring a solid understanding of the system. Your team will learn about data structure, available configuration options, and how specific processes operate. We offer both classroom and webinar training sessions.
Once you start using the software live, rest assured that you'll have access to our dedicated support staff, who are ready to assist with any questions or issues. Additionally, you'll have access to our comprehensive documentation and user guides to support your needs further. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Database used is SQL Server and the SQL backup (.bak file) will be provided if required at the end of the contract.
- End-of-contract process
-
Upon contract termination, the buyer must certify that all copies of compliance software processes, documentation, and confidential information provided have been returned or destroyed. This ensures the protection of proprietary information. The buyer must also acknowledge the relinquishment of its rights to use this information, marking the end of its access to compliance software resources.
Additionally, we offer the option to provide the data in other standard formats if needed. However, this service incurs an additional cost, determined based on the required export format and the volume of data to be exported. This provides flexibility for the buyer if they need to retain or utilize the data in a different format after the contract concludes.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Look and feel will verify to desktop service to mobile service. but can do all the tasks which can see in desktop version
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
We can Provide API access to Assets and Work order information.
Limitations is depends on the service selected. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
Reference Data
Workflow Process
We can customise to client requirements.
Scaling
- Independence of resources
- Service usage alerts has been stepped and our service cloud based. We can increase allocation services as demand increases.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Summary metrics including
No Of Assets and various metrics
No of Work Orders and various usage metrics
Financial - Capital replacement metrics
Usage metrics
Performance reporting on KPIs
Resource management including time-sheet reporting
Custom reports available subjected to service agreement. - Reporting types
-
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
The data is exported as a set of comma-separated values (CSV) files. Data export tools provide a convenient way to obtain a copy of your Asset data, either for backup or for importing into a different system.
From Reports also you can export data in various formats (Csv/excel/XML etc) - Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Data protection within supplier network
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We use Azure Cloud which is provided by Microsoft.
https://azure.microsoft.com/en-gb/support/legal/sla/
and also our internal team available to support the application availability twenty -four (24) hours a day, seven (7) days a week. - Approach to resilience
- We utilise a Azure Cloud environment built using the App service Management platform. It provides an environment that is: - Scalable through auto-scaling (up and out) - Highly available through automatic failover and full active-active High Availability. The application will be hosted in multi-node environment and this will protect from bringing the system down for any reason.
- Outage reporting
- Outage are reported to our clients by email .
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Not Applicable
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
-
Compliance Software has the following security policies and processes: Information & Security policy, Data Attack Preparedness and Response process and Data and Network Security Breach Incident Management policy. The IT Directors of the company conduct incident response with input from other members of the Data, Application and Infrastructure Architectural teams dependent on the type and scale of the issue, with policies reviewed and testing completed regularly, as a minimum.
As part of staff onboarding, we train the staff on the importance of security measures and how to respond to computer and network security incidents.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We follow standard development Configuration and change management process includes GitHub Source Control and Asana for issue tracking to monitor and track features and fixes.
All Change Requests must be submitted in accordance with change management procedures . Each Change Request must receive formal CAB approval before proceeding with the change and it will be created in Asana for tracking (Development, Deployment, 1st and 2 nd level Testing, Release to Test and Live) - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Application Logs created to a logfile and to database on every event based are monitored regularly. Patches are deployed when required. Potential threats are identified offline and online and with regular vulnerability scanning.
Multilocation data backup and we have in place Disaster Recovery procedures and management process in all times. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Protective monitoring controls include recording the logs with time real time stamp with system information and logs suspicious activity at a module level.
Full time in house testing with various tools/methods this will include the data, network, penetration and stress testing. - Incident management type
- Supplier-defined controls
- Incident management approach
-
All staff are trained and made aware of the incident management process which includes reporting the incident
Priority 1, Critical: System down and Critically Impacts to all business activities.
Priority 2, Functional failure: Prevent operation of particular functionality and not usable.
Priority 3, Intermittent failure: The problem is affecting a particular functionality and impacting limited users but the problem is relocatable.
Priority 4, Minor:. Very low impact to users or the problem is cosmetic.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Fighting climate change WT Datatech support in cloud services has significantly impacted the well-being of our staff, our client's staff, and the local communities we serve. With the rise of remote work, we prioritize physical, social, and mental health through our Wellbeing Strategy and Policy. This strategy aims to cultivate a happy and confident workforce that delivers exceptional customer service while positively impacting our communities, whether remotely or in-office. Our initiatives are tailored to meet the needs of our staff, identified and developed accordingly. To ensure the health and happiness of our employees, we have: Established a network of trained mental health first aiders to assist colleagues across our contracts. Fostered a supportive environment that promotes wellbeing through mindfulness and wellness activities each month, with ongoing employee feedback and engagement. Created an environment that supports wellbeing, maintaining a culture of engagement to ensure a happy and confident workforce that delivers exceptional services and positively impacts our communities, whether working remotely or in-office.Covid-19 recovery
Covid-19 recovery Thanks to our cloud technology strategy, when COVID-19 struck, we seamlessly transitioned to remote working with minimal disruption to our services. Since then, our model has evolved into hybrid working. Our offices now offer smaller, modern spaces where teams can work permanently (if unable to work from home) or for essential face-to-face engagements. We've implemented all COVID-19 regulations within these offices, including social distancing measures, one-way walkways, sanitization stations, and informative posters. Despite these changes, our operational performance remained unaffected, allowing us to continue providing Business as Usual (BAU) services, ensuring continuity for our clients' management software needs. WT Datatech has supported our clients and employees throughout the pandemic, contributing to local communities where possible by offering employability advice and educational support through university programs.Tackling economic inequality
Tackling economic inequality With a solid commitment to social value and addressing economic inequality, WT Datatech pledges to uphold the following throughout the contract: WT Datatech understands the challenges that small or new businesses face in their growth journey. We recognize that providing IT Management software can sometimes hinder their operations or ability to secure new business. That's why we offer comprehensive support, including free workshops to identify compliance gaps and assist in developing policies and procedures to meet IT Management software standards. We aim to effectively support businesses of all sizes, offering cost-effective rates and additional assistance to ensure their success. Through our operating model, which leverages remote working via cloud services, we create opportunities for those facing barriers to employment and individuals in deprived areas. We provide training opportunities for Consultants and other staff as needed, ensuring inclusivity and equal access to advancement. Additionally, we have established CPD pathways to facilitate professional progression. WT Datatech is dedicated to addressing economic inequality and collaborates with buyers to explore new and innovative methods of breaking down barriers.Equal opportunity
Our commitment to equality and diversity is not just a statement but a comprehensive policy that we live by. This policy covers Staff Training & Development, monitoring, effective employee communication, and equality-focused training. It is a policy and a promise aligned with all legislation surrounding equal opportunities. We are committed to ensuring this is reflected in our services, and we take pride in the fact that our policy is incorporated into staff contracts and is briefed during staff inductions. Through our robust equal opportunities, diversity, and inclusion policies, we go beyond mere compliance. We actively tailor our services to provide equal opportunities, reflecting the unique demographics and characteristics of the population across the areas in which we operate. We understand that each community is different and value and respect these differences in our approach.Wellbeing
Our cloud support services have significantly contributed to the well-being of our staff, client staff, and the local communities in which we operate. As remote work becomes more prevalent, we prioritize physical, social, and mental health through our Wellbeing Strategy and Policy. This strategy aims to foster a happy and confident workforce that delivers excellent customer service and contributes to the sustainable transformation of our local communities, whether working from home or in-office. These initiatives are tailored to meet the support needs of our staff. To ensure employee health and happiness, we have: An established network of trained mental health first aiders is available across our contracts to assist colleagues. We maintain a culture of well-being through engagement, offering a variety of mindfulness and wellbeing activities each month. We continuously consult with and invite employee feedback to tailor our initiatives effectively.
Pricing
- Price
- £50 to £250 an instance a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- It includes all features with a basic configuration. Max 30 days we will provide a trial.