UK Food Surveillance System Service
A Cloud based service which manages the details and results of food and animal feed samples submitted for analysis and/or examination by Official Control Laboratories (OCLs) on behalf of Local Authorities and other partners.
Features
- Validated Data collection
- Seamless transfer of Food/Animal Feed Sampling data to Laboratories
- Flexible reporting
- Interoperability with Local Authority systems
- Return of Test results to Local Authority
- Collection of Sampling/Test data for national analysis
- Web portal to view and manage sampling data/activity
Benefits
- Collect standard/valid data through API
- Instant upload of sampling data to laboratory eliminating data entry
- Collect data nationally for further analysis/reporting
- Seamless transfer between systems
- Robust time proven solution
- Compatible with common Local Authority Management Systems
- Compatible with major Laboratory Management Systems
- Easy access to data through a modern reporting portal
Pricing
£800 to £800 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 3 8 2 3 9 7 8 0 8 1 6 0 9 0
Contact
MacLaren West LTD
John Anderson
Telephone: 07515396842
Email: john@maclarenwest.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Maintenance is occasionally carried out, but this is performed out of normal working hours (evenings and weekends). Such maintenance is brief and has little or no effect on the service.
- System requirements
-
- A internet connection is required to access the services API
- HTTPS and TSL1.2 is required on connected clients.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
During business hours: Urgent queries are responded to within 2 hours, normal queries are responded to within 48 hours.
Support is not normally provided out of hours (such as evenings and at weekends), but can be provided under special prior arrangement. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
• Major – within 24 hours of receipt of call. Such as Operational failure of the service within the agreed operational hours. Provision of data reports to users to support urgent and time bound queries
• Moderate – within 5 working days of receipt of call. Assistance to users using the system and data mapping/other functions.
• Minor – within 10 working days of receipt of call. Such as: Tracking samples for a local authority to compare with local records; tracking historic data at labs.
All support is included in the cost of the service. Users have access to technical staff at all stages of the support process. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide comprehensive documentation. Onsite and/or online training can be arranged on request for new or existing users.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Data will be provided as full database backup file for each database included in the service. Help will be given to ensure that backups are restored and accessible if requested.
- End-of-contract process
-
We have a full transition guide which will be provided to the client on notice that the contract will expire and not be renewed. We will engage with any future supplier to implement the process detailed in the transition guide upon request.
We will provide all data to the client and ensure that it is accessible.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The service is an API and can be used from any device where a client has been developed to interface with it. Client software on mobile devices may not support some features of the API due to limitations in features of the device.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
-
Users can submit sample data and query data. The API is for authorised users only. Sampling data can be submitted to laboratories through the API and results for completed analysis are returned through the API.
Users can manage data such as Premises data, sampling templates, surveys and local lookup lists through a client connected to the API - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- The resources allocated to the service are sized to meet reasonable usage of the system. Usage is monitored closely and additional resources will be added if required. The service is built to minimise the impact users of the system have on resources.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
All data transfers between clients and the cloud service are logged. Statistics and details of data flow are provided on request, including usage by Sampling organisations (LAs and Port Health Authorities, etc), by country or region, etc.
Further data on performance of Laboratories in analysing and returning results is available. - Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Exports can be requested through support. Exports are provided in CSV or Excel files. We work closely with users to provide data export to meet their specific needs.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- JSON
- XML
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XML
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We guarantee service uptime of 99.9% or greater: (excluding scheduled downtime).
We have no explicit refund policy, but are keen to engage with users and work with them to resolve any harm done as a result unplanned downtime. - Approach to resilience
-
Our service is hosted within Microsofts Azure cloud infrastructure. There is redundancy built into both the network infrastructure and the hardware that the service runs on. The system is designed to scale appropriately to user needs.
The service is designed to be robust and also can be rebuilt within a period of 3 hours. All data is backed up and can be restored with minimal risk of data loss.
Further information is available on request. - Outage reporting
- The service is monitored continuously for an independent source and any outages are reported in real time to support staff through an API and via email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Management interfaces are protected by two factor authentication and limited to authorised users only.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We comply with ISO/IEC 27001 and are working towards certification.
- Information security policies and processes
-
MacLaren West follows security standards as advised by the Open Group Architecture Framework.
• Authentication: Authentication is applied on all systems under our control.
• Authorisation: Role base authorization is used to manage user access to resources,
• Audit: All critical systems include comprehensive auditing. Audits are run regularly, the results of which are reviewed for compliance to company standards.
• Assurance: We maintain automated test suites which we use to verify that all required security policies remain in place. We run automated audit reports on all infrastructure and take action to apply security and performance suggestions from these audits.
• Asset Protection: All data is encrypted at rest and in transit. All data is protected with authentication and authorization rules.
• Administration: All systems have configurable security policies which can be updated based on specified requirements. This includes adding, updating or removing users and roles.
• Risk Management: We are a risk adverse organization. Our highest priority is the security and integrity of data held on behalf of our clients and all reasonable precautions are taken to protect it.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
A suite of automated tests are run against all of the services APIs before a release is authorised. These tests include compressive coverage of services security.
As well as the automated tests, a full code review it performed with a focus on security issues.
Once a build has pass all tests and the code review is completed, the build is deployed to a staging environment where final user tests are performed. Once these tests are passed and reviewed, the build is moved into production.
All builds are versioned and changes documented. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
The service is accessible through a protected API by authorised users. Data transferred through the API is encrypted and transferred over a TLS 1.2 connection. These measures limit vulnerability but do not eliminate it,
We do comprehensive testing of the whole API before release of a new build of the service.
In the case of a serious threat that risked the exposure of data, we apply a patch within 24 hours, possibly sooner.
Potential threat information is gathered from our own testing and features of the Azure cloud infrastructure which performs continuous monitoring of traffic to and from the service. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
The Azure environment we use monitors our service and databases constantly and reports any threats or advisory actions. We review these reports weekly and implement recommended changes.
The service itself monitors usage by authorise parties. We review usage data weekly for any activity that is out of the ordinary. We work with clients to understand or rectify possible issues.
We alert clients of any attempted attacks against the service with details of how the issue was handled. - Incident management type
- Supplier-defined controls
- Incident management approach
-
We have processes for common events such as service errors, authorisation issues and security issues with our services and Azure platform.
The first steps on each process requires the allocation of an incident manager, an assessment of the risk associated by a vulnerability, initiation of any immediate action required to secure the effected service(s) and when a full remediation can by deployed. Disclosure of the incident will be emailed to a predefined list of stakeholders. An advisory notice will also be emailed out if required. After a full remediation an incident, reports will be supplied to the appropriate notification list.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Our service replaces a manual process that traditionally consumes a lot of paper. We have worked with our users to develop processes that fully eliminates this waste.
The data captured by UKFSS is used to target future sampling, further reducing wasteful activity. We are actively implementing features within the service to help further refine the sample planning and targeting, such as allowing users to see general activity across the country to better inform their planning.
Within the company we embrace any effort to reduce our carbon impact. • We offer a Cycle to work scheme to reduce the impact of local travel. • We support remote working and working from home for all members of staff. • We have eliminated the use of on-premises servers in preference to more energy efficient cloud-based solutions. • In choosing the equipment we use, we prioritise features such as sustainability, energy efficiency and the use of harmful or hard to recycle substances in manufacturing processes and the equipment itself. • We use equipment that has a long useful life. We work with partners that are also committed to reducing their negative impact on the planet. We chose Microsoft Azure, who take their commitment to the environment seriously, as our cloud partner. By partnering with Microsoft, by 2025 our cloud services will use 100% renewable energy, they will be Water positive by 2030 and be Zero-waste certified by 2030.
Pricing
- Price
- £800 to £800 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No