UVISIT LTD

Desk Booking System

Visitor Management and Booking Service covering desk, meeting rooms and other requirements

Features

  • Desk booking
  • Visitor management
  • Management information provision
  • Contactless visitor registration
  • Meeting room booking

Benefits

  • Remotely book a desk from any device
  • Register visitors to buildings in a contactless

Pricing

£2.00 a unit a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at m.salisbury@u-visit.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

6 2 9 5 4 5 5 6 4 6 4 6 3 0 8

Contact

UVISIT LTD Mark
Telephone: 07887874909
Email: m.salisbury@u-visit.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Maintenance will take place in line with the schedules and terms & conditions
System requirements
Latest Version of Modern Browser (Edge, Safari, Chrome)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 4 working hours
User can manage status and priority of support tickets
No
Phone support
No
Web chat support
No
Onsite support
No
Support levels
Our service runs standard support level for all customers. Detail can be found in our terms and on our website
Support available to third parties
Yes

Onboarding and offboarding

Getting started
User documentation is provided as standard. On site and online training can be provided at additional cost
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Export details to CSV from administration portal
End-of-contract process
At the end of the contract all user access to the system will be suspended. Users will be given the opportunity to download their data prior to contract end. All customer data will be deleted within 28 days of the end of the contract

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Visitor and desk sign in and desk booking work for mobile devices.
Admin services are not fully optimised for mobile devices but will work.
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
The system operates from a number of portals and all interfaces for end user and and administrator functions are available through a web browser
Accessibility standards
None or don’t know
Description of accessibility
See above
Accessibility testing
We are currently reviewing this
API
No
Customisation available
Yes
Description of customisation
This would need to be agreed on a case by case basis

Scaling

Independence of resources
All elements of the architecture scale vertically with the application scaling horizontally as well

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
CSV export option exists from the admin portal. No import capability exists in the tool. However, professional services are able to import data as part of system set-up if required
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.5%
Approach to resilience
We use Microsoft Azure serverless services
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces is defined by the role that has been granted to the user. To access support you must be a named user agreed with us
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We look to follow Cyber Essentials principles
Information security policies and processes
As a start up organisation we are currently reviewing the reporting structure.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Source control is used for all code. Changes are assessed by a panel and developer tools and azure tools are used to look at any potential security impacts
Vulnerability management type
Undisclosed
Vulnerability management approach
We use Microsoft Defender for Cloud which alerts to any vulnerabilities at an infrastructure level. This provides monitoring and realtime alerting
Protective monitoring type
Undisclosed
Protective monitoring approach
We use Microsoft Defender for Cloud to monitor and detect potential compromises. Alerting has been defined
Incident management type
Undisclosed
Incident management approach
All events are reported to the CTO. Action plans are defined as appropriate along with the relevant reporting approach

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Available on request
Covid-19 recovery

Covid-19 recovery

Available on request
Tackling economic inequality

Tackling economic inequality

Available on request
Equal opportunity

Equal opportunity

Available on request
Wellbeing

Wellbeing

Available on request

Pricing

Price
£2.00 a unit a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
7 day trial of the service is available subject to terms

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at m.salisbury@u-visit.com. Tell them what format you need. It will help if you say what assistive technology you use.