GEOSPATIAL DATA CAPTURE AND MAINTENANCE
Enhance, update, and maintain geo-databases
Migrate legacy data for modern systems and delivery channels
Remote sensing and LiDAR datasets processing
Forest Management, Information Management. It can provide applications-related support services containing service management and reporting, integration, release and testing support.
Features
- Secured services
- Quality Deliverables
- Multiple Device
- cross-platform application
- Seamless multi-site maintenance support services
- Onsite-Onshore delivery model
- Enhancement services for third party products
- Incident management
- Application migration
- Database migration – SDE to Geodatabase and other DB formats
Benefits
- Maintaining Data privacy
- Reduced cost
- Support Multiple devices
- Improved effectiveness in Cloud based application
- Improved Business ROI
- 24 by 7 business continuity
- Can implement CI/CD
Pricing
£25,500 an instance
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 3 7 1 9 2 2 6 4 6 9 0 8 4 2
Contact
RMSI LIMITED
Rahul Srivastava
Telephone: +447340720606
Email: Rahul.Srivastava@rmsi.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
-
Yes, our services do have constraints that customers should know about.
Non-standard technologies such as legacy applications are not supported by default. However, both extended support hours and support for specialist applications can be purchased via the SFIA rate card. - System requirements
-
- Provide first line user support for basic queries
- Provision of service support desk
- Network resources - Bandwidth and latency
- Maintaining existing or previous cloud hosting environment
- Security of the system
- Monitoring tools and Logging
- Backup and Disaster recovery
- Compliances and regulatory requirements
- Scalability and Elasticity
- Cost optimization
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
The response is based upon SLA
1) Critical defects within 24 hours
2) Major defects within 2-3 days
3) Minor/Average defects within 3-4 days - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide the day to day support for smooth execution of the application.
The support provided by us at different levels are:
1) We provide video help and faqs for self-service.
2) Provide person-to-person support
3) Provide technical person support
4) Provide expert (SME) support
5) Can provide third-party support if the software is being used in our application.
The individual services can be obtained within the agreed framework and will be charged accordingly. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We provide train the trainer training to the administrator of our application services.
We provide onsite and online trainings the the application user.
The user manual/help manual and presentations of the application are part of our deliverables - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- The database, code files and documents are shared with the users when the contract to the service ends.
- End-of-contract process
-
At the end of the contract project closure activities start like training the users, sharing the administrator credentials, handover of the application, and sharing code and database backups.
The cost of the software is included in the contract and additional cost is the hardware infrastructure and purchase of third party licenses
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
In mobile application user can benefit using portability of the application where as desktop service are not portable
User can capture real location data in both online/offline mode in Mobile application.
Usability in the mobile application is easier. - Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- Yes
- What users can and can't do using the API
- Our service API runs in the background as a service to fetch and transfer the data. Users cannot directly access those services. We can provide the interface if the user required it to update/maintain the APIs
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- During the design of the application, we consider the hardware infrastructure such that it takes concurrent users, the maximum number of application users so that in case the request is increased it does not affect other users. We also maintain load balancers and DR sites so that business continuity will be there.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We provide fortnightly/monthly application reports to the users.
Conduct monthly cadence meetings with the users. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
The application data can be exported by the users in Excel, CSV, JSON and pdf formats.
The backup of database can also be shared as data dump with the user and steps to restore that data - Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Our SLAs for the availability are defined as per our CMMI guidelines. Our systems ensure 99.9 availability. We do follow DC - DR system architecture strategy to ensure redundancy and protection of system critical data. Regular health checks of the system are done 24 by 7 to ensure quick remediation and ensure availability. Communication is being sent to stakeholders in case of failover and immediate steps are taken to ensure 99.9 % Business continuity
- Approach to resilience
-
Our service is designed with resilience in mind to ensure high availability, reliability, and continuity of operations even in the face of disruptions or failures. Here's how our service achieves resilience:
Redundancy and Failover:
We implement redundancy at multiple levels, including hardware, networking, and software components.
Critical systems are designed with failover mechanisms to automatically switch to backup resources or systems in case of hardware or software failures.
Redundant data storage systems ensure data integrity and availability even if one storage node fails. Our service is deployed across multiple geographic locations or data centers. We employ comprehensive monitoring tools to track the health and performance of our systems in real-time.
Monitoring includes metrics such as CPU utilization, memory usage, network traffic, and application-specific indicators.
Automated alerting notifies our operations team of any abnormalities or potential issues, enabling proactive response and mitigation. - Outage reporting
- Our service reports are shared with the stakeholders regularly. On detection of the outages, email alerts are sent to the stakeholders for information and quick fixing of the outages. We proactively communicate outage details and updates to affected customers via email notifications or in-app messages. The Root cause analysis is done after a detailed examination of the outages to prevent future outages of the same nature.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We have a separate admin panel in our services. The privilege is restricted to selected users suggested by the clients. Only they can see and use the admin panel and other users won't be able to see the admin panel
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI India
- ISO/IEC 27001 accreditation date
- 02/09/2021
- What the ISO/IEC 27001 doesn’t cover
- All controls are covered
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- RMSI is an ISO 27001:2013 certified company since 2006 onwards for data and information security management services and all the IT implementation is as per guidelines provided by ISO to ensure confidentiality, integrity and high availability of critical IT resources.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We do follow CMMI Level 5 Configuration management standards. The change suggested by the client is verified and impact analysis is done to look after efforts and cost. The effort and cost are shared with the client for approval. The design document is prepared and shared with the client for approval. Development starts when the scope is frozen and changes are delivered to the client.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We are CMMI Level 5 company on fortnightly basis we have internal audits planned with independent QA team to identify the vulnerabilities in the project. The project manager reviews the vulnerabilities on regular basis.
We deploy critical vulnerabilities with 24-48 hours depending upon the downtime suggested by client. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Protective monitoring combines essential processes to ensure the security and accountability of ICT systems. It involves collecting and recording data on system events (accounting), systematically evaluating this data (auditing), providing feedback to stakeholders on organizational risk and system performance (reporting), and issuing timely notifications of security incidents (alerting). This approach establishes a comprehensive audit trail of security-related activities, facilitating incident investigation, compliance audits, and ongoing security enhancement efforts. Ultimately, protective monitoring enables organizations to detect, respond to, and mitigate security threats effectively, enhancing overall cybersecurity resilience.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Incident management processes are critical to quickly detecting, responding to, and correcting information security breaches in an organization's ICT environment.
Incidents are detected in several ways, including through automated monitoring tools, user reports, or system alerts.
Users are encouraged to report any suspicious activity or security issues promptly. Incidents are classified by severity and impact to prioritize response actions. After detection, incidents are tested to determine their nature, scope, and potential impact.
Gather basic information about the incident, including systems, information, and involved parties.
Incidents are escalated to appropriate stakeholders. Root cause analysis is done to prevent future recurrence.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
RMSI is committed to following environmental processes and practices in all its operations, products, and services. RMSI aims to reduce its carbon footprint by improving resource efficiency by adopting the ‘3R - reduce, reuse and recycle’ philosophy, promoting a green environment. RMSI follows green ethos like: Paper-free office premises, Pollution free campus and Electronic communication. Key initiatives are:
1. ISO Certification and Compliances: RMSI is a third-party ISO 14001 certified organization (certified by TUV NORD). RMSI also ensures compliance with all local environmental laws, as applicable.
2. Monitoring GHG Emissions: In line with UK Government’s Climate Change Act, RMSI is committed to achieving Net Zero emissions by 2050. To ensure compliance in this aspect, RMSI UK has started monitoring its GHG emissions from FY 2023-24 onwards.
3. Environmental Responsibility as part of Community Engagement: RMSI’s community engagement programs are driven by an employee-led group- “Helping Hands” - that connects employees with volunteering opportunities for various social issues.
4. Raising Environmental Awareness Internally: RMSI builds environmental awareness amongst its workforce by organizing regular briefing sessions for all employees
5. Celebration of Global Environmental Days: RMSI celebrates World Environment Day, Earth Day, and Earth Hour across its offices each year.
6. Paper-free Marketing Collaterals: RMSI uses digital flyers/brochures for the dissemination of information at business conferences. We use QR codes for the delegates to download our flyers, thus, eliminating the use of paper flyers/brochures.
7. Environmental Data Reporting and Monitoring: As part of our ongoing environmental initiatives, we have included "Reduction of resource utilization" as an aspect of our Integrated Management System (ISO) objectives. These objectives are monitored every quarter. To ensure effectiveness in our management measures, our environmental data and metrics are reviewed by the organization’s Senior Management Team on a half-yearly basis.Covid-19 recovery
At RMSI, we are committed to protecting the health and safety of our employees, clients, and partners. In the wake of COVID-19 outbreak and its spread across countries, we have implemented various health and safety measures as defined by the central, state and country-specific government guidelines across all our offices.
Precautionary Measures implemented across offices
The following mandatory precautionary measures have been implemented across offices and circulated among all employees through email notification as well as display of posters at common areas:
All non-essential domestic/international travel is highly restricted.
Employees on international business/personal travel are mandatorily required to work from home and self-quarantine for fourteen days upon their return. During this time their health is monitored every day. These employees are required to share a medical fitness certificate before resuming work.
Biometric attendance system has been de-activated and attendance is being tracked through access card swipe.
A central Travel Helpline and email ID has been activated for all our employees.
On-premise disease surveillance to identify employees with flu-like symptoms is being conducted on a daily basis along with monitoring the health of employees who are on leave. Any such employee is required to share a medical fitness certificate before resuming work.
All employee engagement activities, trainings, celebrations and gatherings have been suspended at our offices. Meetings with external visitors as well as interviews are being conducted virtually through skype/phone/video conferencing.
We have taken very strong preventive measures like continuous disinfection and sanitization of all our offices. All employees must sanitize themselves before entering office premises.
We are ensuring strict compliance with country-specific government guidelines and advisories issued by the Department of Health and Welfare across all our offices.
Basic health and hygiene sensitization and advisory communication has been shared with all employees across our officesTackling economic inequality
RMSI is committed to fostering a culture of diversity and inclusion by providing a work environment that invokes fairness, equity and respect for all:
1. Equal Opportunity Employers: RMSI’s code of conduct emphasizes on the core value of being an equal opportunity employer without any biases. There is no discrimination against individuals on basis gender, social/economic status. Specially-abled candidates are treated at par with other employees.
2. Hiring from Varied Sources: To gain access to a diverse talent pool, RMSI hires from a variety of sources such as college campuses, internal referrals, walk-ins, career portals etc.
3. Skill Development Centres: As part of our Corporate Social Responsibility initiatives, RMSI has sponsored Skill development programs for LGBTQ+ individuals, specially-abled youth and underprivileged women.
4. Fair Compensation: RMSI ensures that employee compensation is consistent with market standards. We are a third party ISO certified organization and are compliant with all applicable labor laws - this is verified through regular third-party audits.
5. Zero-tolerance to Harassment: RMSI is committed to fostering a workplace free of harassment. We have a zero-tolerance policy towards harassment of any kind. Everyone has access to a dedicated platform to report any such grievance.
6. ‘All Inclusive’ Policy: All employees in the company are treated equally. All policies are egalitarian and are implemented consistently across the company.
7. Learning and Development: Customized technical/ behavioral learning programs are conducted on a regular basis to help upgrade domain knowledge as well as bridge competency gaps. Employees have access to internal Subject Matter Experts, Mentors and coaches for additional support and guidance. Learning data is tracked and published on a monthly basis.Equal opportunity
RMSI facilitates an environment of continuous learning, through the following measures:
1. Annual Learning Calendar: By identifying business-specific key learning needs of employees as listed by their managers during the performance assessment process, and prioritization of learning needs after a discussion with Business Heads, an Annual Learning Plan is developed and published to all employees.
2. Focused Learning Programs: Customized learning programs for each business are conducted all through the year. To hone employees’ leadership and managerial skills, various development programs such as design thinking, negotiation, communication and presentation skills,team management, etc.
3. Competency Development Program (CDP): Under this program, employees are sponsored by RMSI to get trained in latest technologies for personal and professional growth.
4. Fast Track Growth Plan for High Potential Employees: This program helps in developing high performers through a defined career path. Key contributors are identified and provided with an opportunity to grow faster than their peers, by reaching the next level in their career within the shortest time frame.
5. Objective Performance Evaluation: For each employee, quantifiable goals or KRAs are defined at the beginning of the year. The criteria of evaluation of performance are also shared with the individual employees at the beginning of the year. These goals are reviewed bi-annually to track the status and progress in the past six months.
6. Effectiveness of Learning Programs: On completion of a learning program, immediate feedback is taken from all participants through a detailed feedback form. Effectiveness is measured by conducting assessments after each learning program.
7. Learning Metrics Reporting: We analyze key learning parameters and performance indicators such as learning man-days, learning program cost, feedback and effectiveness, etc. for organization-wide technical/ behavioral programs on a monthly basis.Wellbeing
RMSI is a third-party ISO 45001 certified organization - our practices focus on mitigating Occupational Health and Safety concerns and promoting holistic well-being at work. We aim to create a positive impact on employee productivity, engagement, and overall job satisfaction through a range of programs:
Mental Wellness: The following initiatives focused on mental wellness are launched regularly:
Psychologist Support: RMSI provides employees with on-demand access to mental health support with trained psychologists, whenever needed.
Stress Management through fun at work: Movie screening, team celebrations, fun events, pottery, art workshops, jazz workshops, contests and brain teasers are organized.
Mental Wellness Communication: Regular awareness communication is launched on various mental wellness aspects like “Mental Health Myths”, “Common Mental Health Conditions” etc.
Physical Wellness: Educational programs on healthy living are regularly made available to employees:
Workshops on Lifestyle disorders: Expert-led workshops are conducted on lifestyle disorders like diabetes, cancer, brain stroke etc.
Initiatives focused on Occupational Hazards: Back pain due to long hours in front of the computer is a common health issue among working professionals.
Executive Health Check-ups: A comprehensive general health check-up with reputed specialists from partner hospitals is organized annually and Eye checkup camps.
Wellness Wednesday (Advisory communication): Advisories on occupational health and safety practices as well as general wellness topics are published regularly.
Social Wellness: RMSI's policies and programs encourage work-life balance and connect employees to social causes like education, community development and environmental initiatives.
Intellectual Wellness: RMSI believes in boosting innovation, problem solving and analytical thinking by engaging employees in creative and mentally stimulating initiatives such as Idea Hub, RMSI Hackathon.
Financial Wellness: RMSI has tie-ups with Financial Investment and Planning firms through which employees are provided with access to financial planning resources and guidance, to help them plan for their future.
Pricing
- Price
- £25,500 an instance
- Discount for educational organisations
- No
- Free trial available
- No