Desk Booking System
Visitor Management and Booking Service covering desk, meeting rooms and other requirements
Features
- Desk booking
- Visitor management
- Management information provision
- Contactless visitor registration
- Meeting room booking
Benefits
- Remotely book a desk from any device
- Register visitors to buildings in a contactless
Pricing
£2.00 a unit a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at m.salisbury@u-visit.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 13
Service ID
6 2 9 5 4 5 5 6 4 6 4 6 3 0 8
Contact
UVISIT LTD
Mark
Telephone: 07887874909
Email: m.salisbury@u-visit.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Maintenance will take place in line with the schedules and terms & conditions
- System requirements
- Latest Version of Modern Browser (Edge, Safari, Chrome)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 4 working hours
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
- Our service runs standard support level for all customers. Detail can be found in our terms and on our website
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- User documentation is provided as standard. On site and online training can be provided at additional cost
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Export details to CSV from administration portal
- End-of-contract process
- At the end of the contract all user access to the system will be suspended. Users will be given the opportunity to download their data prior to contract end. All customer data will be deleted within 28 days of the end of the contract
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Visitor and desk sign in and desk booking work for mobile devices.
Admin services are not fully optimised for mobile devices but will work. - Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The system operates from a number of portals and all interfaces for end user and and administrator functions are available through a web browser
- Accessibility standards
- None or don’t know
- Description of accessibility
- See above
- Accessibility testing
- We are currently reviewing this
- API
- No
- Customisation available
- Yes
- Description of customisation
- This would need to be agreed on a case by case basis
Scaling
- Independence of resources
- All elements of the architecture scale vertically with the application scaling horizontally as well
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- CSV export option exists from the admin portal. No import capability exists in the tool. However, professional services are able to import data as part of system set-up if required
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.5%
- Approach to resilience
- We use Microsoft Azure serverless services
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Access to management interfaces is defined by the role that has been granted to the user. To access support you must be a named user agreed with us
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We look to follow Cyber Essentials principles
- Information security policies and processes
- As a start up organisation we are currently reviewing the reporting structure.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Source control is used for all code. Changes are assessed by a panel and developer tools and azure tools are used to look at any potential security impacts
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- We use Microsoft Defender for Cloud which alerts to any vulnerabilities at an infrastructure level. This provides monitoring and realtime alerting
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- We use Microsoft Defender for Cloud to monitor and detect potential compromises. Alerting has been defined
- Incident management type
- Undisclosed
- Incident management approach
- All events are reported to the CTO. Action plans are defined as appropriate along with the relevant reporting approach
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Available on request - Covid-19 recovery
-
Covid-19 recovery
Available on request - Tackling economic inequality
-
Tackling economic inequality
Available on request - Equal opportunity
-
Equal opportunity
Available on request - Wellbeing
-
Wellbeing
Available on request
Pricing
- Price
- £2.00 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 7 day trial of the service is available subject to terms
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at m.salisbury@u-visit.com.
Tell them what format you need. It will help if you say what assistive technology you use.