SwiftTrack

SwiftTrack Assessment: LMS/CPD/eTRB

SwiftTrack Assessment is a business tool that allows managers to assess teams against a predefined list of requirements. It can be used as a powerful but simple to use training record for staff; giving organisations the ability to easily track and monitor competence and performance standards.

Features

  • Works fully offline and syncs when connected to internet
  • Work either app or desktop-based
  • Fully customisable to your way of doing things
  • Scaleable to your requirements
  • Write your own attainments, competencies and resources
  • Mobile, cloud-based assessment and learning resources
  • Full HD Video, photo and audio-based evidencing as standard
  • Ready to use right out of the box
  • Customisable to your requirements
  • Unlimited possibilities designed to work in any industry or application

Benefits

  • Empower employees, trainees and assessors to perform assessments
  • Quickly view progress of groups of people in one place
  • Schedule assessments and set reminders to optimise time
  • Share achievements, progress and accreditations with 3rd parties
  • Record, access and share rich media evidencing of attainments
  • Available on any modern mobile device
  • Offer staff an ongoing CPD manager
  • Give staff and assessors access to learning materials and resources

Pricing

£19.50 a user a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at enquiries@swifttrack.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

6 0 8 5 6 6 2 5 6 3 1 0 4 7 4

Contact

SwiftTrack Matthew Riley
Telephone: +44 (0)800 689 3682
Email: enquiries@swifttrack.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Moodle, Xero
Cloud deployment model
Private cloud
Service constraints
No
System requirements
  • Android V7+
  • IOS 9+

User support

Email or online ticketing support
Email or online ticketing
Support response times
Mon-Fri within an hour, when available on weekends
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
In addition to the support included in the standard set-up, SwiftTrack offers a range of additional services that can be purchased as and when required.
Additional training can be provided: £500/day
Additional content creation: £45/hour
10 hour additional support package: £400
20 hour additional support package: £700
Support available to third parties
No

Onboarding and offboarding

Getting started
We provide onsite training, a start pack and online training if required is available via Teams/Zoom.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
They can export all data into an excel spreadsheet, and visually as PDFs.
End-of-contract process
These services are part of the contract:
• Initial project specification
• Data input
• 1 day's onsite training

Paid for:
• If required: Software development, including additional functionality
• If required: Additional training

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The mobile application is designed for evidence gathering and self assessment. It gives users working in remote locations or without internet access the ability to still work and then sync data when they get internet connection.
Service interface
No
User support accessibility
WCAG 2.1 AAA
API
Yes
What users can and can't do using the API
The API is a read only feature that allows data to pass to Moodle and accounting applications, such as Xero. It can also be configured to work with various CRM systems.
API documentation
Yes
API documentation formats
Other
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
The service is highly customisable, in terms of the Interface design, termininology and functionality.

Users have an admin panel from where they can perform customisation

Super administrators are the only ones with access to these tools

Scaling

Independence of resources
We use a scaleable cloud model

Analytics

Service usage metrics
Yes
Metrics types
• Data storage
• User count
• Completion levels
• Bespoke metrics
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
A simple export to excel feature
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We guarantee that downtime will not exceed 8 hours in one year, which is > 99.9% uptime. We would discuss refunds on a case-by-case basis if it were ever to become an issue.
Approach to resilience
The service is housed on an extremely resiliant system architecure, with multiple fallbacks and self-healing properties. For security reasons we don't give this infortmation publicly but in certain cirtumstances we can make it available.
Outage reporting
Via email alerts.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
We don't do this.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
CSA CCM version 3.0
Information security policies and processes
We have the following policies and processes in place, we ensure policies are followed by staff by providing adequate training and review processes. Infringments of policies relating to users are dealt with on a case-by-case basis,

Acceptable Use Policy
Security Awareness and Training Policy
Change Management Policy
Incident Response Policy
Remote Access Policy
Vendor Management Policy
Password Creation and Management Policy
Network Security Policy
Data Retention Policy
GDPR Policy
Mobile Device Management (MDM) Policy and Procedures
Bring Your Own Device (BYOD)
Encryption and Decryption Policy
SPAM Protection Policies
System Maintenance Policy
Vulnerability Management Policy

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We are currently reviewing our change management process with a third-party consultant, this will be completed and available from the 25th of May.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We are currently reviewing our vulnerability management process with a third-party consultant, this will be completed and available from the 25th of May.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We have bespoke software in-place to monitor any compromises or potential compromises. It uses an algorythmic approach and simulates prospective attacks or system failures which would lead to a compromise.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have a fully documented incident management approach, for which we offer training as part of an induction. This document is fully available internally.

We report any data breaches, which lead to personal data being exposed, to the ICO.

Any incedents are written up and logged internally.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

N/A
Covid-19 recovery

Covid-19 recovery

N/A
Tackling economic inequality

Tackling economic inequality

N/A
Equal opportunity

Equal opportunity

N/A
Wellbeing

Wellbeing

N/A

Pricing

Price
£19.50 a user a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
1 months free trail - fully functional.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at enquiries@swifttrack.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.