Built Intelligence Ltd

Academy Learning Management System LMS

Built Intelligence LMS is our easy-to-use Learning Management System, it provides you and your project team with access to a suite of eLearning, ePortfolio, skills assessments and knowledge management tools.

In addition it also contains tools to facilitate face-to-face training, monitoring, reporting analytics and the development of role-based capability frameworks.

Features

  • Hosted/SaaS LMS
  • SCORM 1.2, SCORM 2004 v2nd, 3rd, 4th compliant
  • Accessible via Mac, PC, iPhone, iPad, Android
  • Themes/brand customisation
  • API for integration with other systems
  • Certificates
  • Course library, performance management, live trainings, surveys
  • Automatic scheduled compliance reminders
  • Extensive reporting/analytics and permissions
  • Clean and easy user experience without distraction

Benefits

  • Save time and money on travel and venues for training
  • Increase workforce productivity
  • Access a wider global audience
  • Manage and build on your current training material
  • Create dialogue & discussion around training topics
  • Easy to use
  • Mobile
  • Affordable and cost effective
  • UK based team
  • No downloads or installation required

Pricing

£5 to £25 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at enquiries-gcloud@builtintelligence.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

5 5 3 2 4 5 5 0 6 3 6 3 6 0 6

Contact

Built Intelligence Ltd Chris Corr
Telephone: 0117 214 0890
Email: enquiries-gcloud@builtintelligence.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
The platform can be integrated with ticket management systems, chat systems and other third party systems. Anything you see on our platform, can also be done via an API call.
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
All non-critical software updates occur outside normal office hours, usually between 9pm and 12am, all users will be warned on login about any impending updates. Critical maintenance may happen during office hours but this will only happen if there is a functional issue with the system to all users. Online support is available via help pages, FAQ sections and training information.
System requirements
  • Internet Access (minimum 128kbps)
  • Internet Browser (Latest version Microsoft Edge, Firefox, Chrome, Safari 9+)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support is email based and within UK office hours 9:00am to 5:30pm. We aim to respond within 1 working hour.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
Our platform is monitored continuously for WCAG compliance.
Onsite support
Yes, at extra cost
Support levels
We provide telephone, email and chat support free of charge to all our customers, on-site support requirements are negotiated on a per customer basis and charged at our standard day rate plus expenses.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide an initial consultancy service where we identify key stakeholders within your organisation, your training and content requirements.

We can then train appropriate individuals in the management and support of the learning process and also provide general support on an ongoing basis.

The system is extensively documented and has its own support community.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
System data can be exported and manipulated very easily into any suitable format using any modern database administration tool. All training records can also be exported in CSV format
End-of-contract process
System data can be exported and manipulated very easily into any suitable format using any modern database administration tool. All training records can also be exported in CSV format.
We can provide a data export of the system as part of our service. Any further assistance with data migration is costed on a per project basis according to our standard day rate. We retain customer data in line with our ISO27001 standards for 12 years

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
For standard users, functionality on the mobile version of the service is largely the same as that of the desktop version. There may be alteration to the layout and behaviour of certain elements of the system functionality.

Administrative users may require the use of a desktop to access all of the functionality available to them.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
We provide WEBAPI 2.0 RESTful web services authenticated using OWIN Auth 2.0 authentication via secure HTTPS protocols. The API services allow any authenticated device (mobile, web, desktop etc.) to securely connect to the platform and interact with the platforms feature sets. The platform provides responses through JSON text ensuring minimal bandwidth usage, clear readability of the data transferred and greater support for connecting clients.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Our platform is monitored continuously for WCAG compliance.
API
Yes
What users can and can't do using the API
Academy is a 100% API driven SaaS solution and all tasks/actions that can be performed using Academy is done so via our API. We provide WEBAPI 2.0 RESTful web services authenticated using OWIN Auth 2.0 authentication via secure HTTPS protocols. The API services allow any authenticated device (mobile, web, desktop etc.) to securely connect to the platform and interact with the platforms feature sets. The platform provides responses through JSON text ensuring minimal bandwidth usage, clear readability of the data transferred and greater support for connecting clients.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Enterprise instance can be customised/themed to clients branding

Scaling

Independence of resources
Using the hybrid cloud platform with AWS, which are seamlessly increased to the requirements needed by their users. Academy is a PaaS service that utilises numerous AWS resources to provide a scalable, reliable, secure and high performing platform.

Analytics

Service usage metrics
Yes
Metrics types
Various metrics are available through Analytics and Insights, which include completion statistics, usage metrics, unique users, course enrolments and these can be easily exported in csv or pdf.

Recurring reports can also be scheduled to be received via email.
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
System data can be exported and manipulated very easily into any suitable format using any modern database administration tool.
All training records can also be exported in CSV format.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • XLS
  • XLSX
  • JSON via API
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • XLS
  • XLSX
  • JSON via API

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We contractually guarantee 99.5% availability apart from for scheduled maintenance downtime which are carried out outside normal working hours.

Any failures to meet this level of availability will result in service credits awarded to to the customer
Approach to resilience
Follow key processes to support resilience - Incident response plans, backup and recovery plans, vendor assessments, and Risk management.
These plans include taking daily snapshots (backups) and near-real-time replicating data to a separate, geographically isolated location
within the customer's region. Uses the world leader in Infrastructure as a Service (IaaS), Amazon Web Services (AWS) to host data in the customer's geographical region, each region has multiple, isolated locations known as Availability Zones where customer data is replicated for disaster recovery purposes. The use of multiple AWS Availability Zones is to ensure that if there is a failure in one physical location, the data is readily available in another geographically separate location
Outage reporting
We have a 3rd party monitoring service in place on top of the standard monitoring offered by our cloud hosting supplier. It provides a dashboard, API and alerts via SMS and email.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces and support channels is made available to authorised internal personnel, authorised hosting provider support teams and authorised database administrators have access to any data.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Alcumus ISOQAR
ISO/IEC 27001 accreditation date
18/05/2022
What the ISO/IEC 27001 doesn’t cover
All activity is covered.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
ISO27001

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
All security policies and processes are managed under our ISO 27001 certified Information Security Management System (ISMS). We hold quarterly Information Security Board meeting to review the ISMS. We are also accredited under the Cyber Essentials Plus Scheme (http://www.cyberessentials.org).

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Aligned with ISO 27001
Maintaining and enhancing security is a disciplined, continual, and ongoing process. Secure coding and security testing are, therefore,
integral components of LMS engineering and development methodology. All code in the application must go through a developer
peer review process before it is merged into the code base repository. The code review includes security auditing based on the Open
Web Application Security Project (OWASP) secure coding and code review documents and other community sources on best security
practice
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
3rd party conducts both internal vulnerability scans and external security audits and penetration testing to monitor for vulnerabilities. If any vulnerabilities are detected, 3rd party security and engineering teams work together to analyse, design, and develop the required patch and update security protocols accordingly.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Service is hosted on the state-of-the-technology cloud infrastructure provided by Amazon Web Services (AWS). The AWS
infrastructure is highly stable, fault-tolerant, and secure For additional information about AWS’ security program, certifications and
standards compliance, please refer to http://aws.amazon.com/security and http://aws.amazon.com/compliance/.
Incident management type
Supplier-defined controls
Incident management approach
Implementation of a comprehensive set of security technologies, management and review policies, monitoring operations, and enforcement procedures to ensure that our system and data security meets or exceeds governmental statutes and regulations, industry standards, and institutional requirements. No organisation is impenetrable and, accordingly, prepared plans to help most effectively facilitate a security incident.

A detailed summary of Incident Response Policy and Plan as it relates to security incidents is available in a white paper on request. Additional details regarding our procedures and plans in the event of system downtime is further documented in the Disaster Recovery white paper.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
Other
Other public sector networks
  • Auth0
  • SAML Authentication
  • Social logins

Social Value

Fighting climate change

Fighting climate change

Our vision as a company is to act responsibility towards others and the planet as a whole.
How we can work inclusively and sustainable and how we can ensure the impact of our business decisions have a positive affect on our staff, our customers, our suppliers, our business community and the world.
We have taken small steps to implement a greener way of working (from recycling plastic and toner cartridges to offering staff incentives through the Cycle to Work Scheme to minimising our carbon footprint wherever possible, and those of our customers by offering digital alternatives to face-to-face training and support.
Covid-19 recovery

Covid-19 recovery

We are keen to allow people impacted by the COVID-19 pandemic to move into a high growth sector, and alongside our 'work from anywhere' policy means that our positions are highly accessible to all.
Tackling economic inequality

Tackling economic inequality

We understand the importance of effective processes for the recruitment and training of early talent. We also recognise that this provides an opportunity for us to deliver social value by creating opportunities for underrepresented groups and individuals who may have previously faced barriers to employment in the industry, such as those with disabilities, from economically deprived areas, ethnic minorities and women.

We provide high quality employment conditions in line with the Good Work Plan which is met through satisfaction, fair pay - benchmarking salaries of every position through indeed, participation and progression -a tailored training plan for everyone and BuildUp Scheme , wellbeing safety and security and regular engagement and check ins with management as well as detailed annual staff surveys.

Our ‘work from anywhere’ policy means our positions are highly accessible to those with disabilities and from deprived areas.

Our commitment is overseen and assured by some of our most senior members of staff.
Equal opportunity

Equal opportunity

We understand the importance of providing equal opportunities, and have set a target for at least 50% of new roles to be filled by individuals who may have previously faced barriers to employment in the industry, such as those with disabilities, from economically deprived areas, ethnic minorities and women.
We will reach this target through a tailored recruitment strategy, including by:

• Advertising the positions on specialist job sites, such as Evenbreak for people with disabilities and Women into Construction,
• Engaging with Job Centre Plus facilities in economically deprived postcodes, and
• Following best practice to make selection and interviews as accessible as possible.

Our ‘work from anywhere’ policy means our positions are highly accessible to those with disabilities and from deprived areas.

It is important that all staff, regardless of background or position, have a chance for professional development and advancement. Our Buildup scheme will recognise any new staff with outstanding ability and leadership potential within the first 36 months of their employment, and give them access to additional training, mentorship from Senior Management and SetSquared mentors, and peer support.
Wellbeing

Wellbeing

Staff well being is at the forefront of our vision. As well as giving an impressive holiday allowance to promote work/life balance we offer easy to access resources on health, safety and wellbeing as well as regular informal check ins. As a company providing online training courses to some of the largest names in the construction industry, we are well positioned to ensure our team members receive a high standard of training to equip them for their role and personal development.

Pricing

Price
£5 to £25 a user a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free time limited trials are available or hands on demonstrations.
Link to free trial
https://www.builtintelligence.com/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at enquiries-gcloud@builtintelligence.com. Tell them what format you need. It will help if you say what assistive technology you use.