accessplanit LMS
accessplanit LMS is a cloud software solution purpose built to automate end-to-end learning administration and provide an engaging employee journey with self-service user and manager portals and to help manage compliance via in-depth reporting. Implementation, system training, Support Helpdesk and a dedicated Customer Success Manager for system usage optimisation included.
Features
- Scheduling and management of multiple course types (SCORM, xAPI compliant)
- Online, personalised user portal with booking facility (optional approval function)
- Track learning progress and compliance, including automated expiry reminders
- CPD management
- Real time reporting which can be exported, shared and scheduled
- Evaluations and surveys
- Automated, triggered email and SMS communications such as course reminders
- Tasks and reminders
- A powerful workflow engine to automate actions
- Accessible 24/7 from any device
Benefits
- Empower employees by giving access to own learning and development
- Training and documentation can be delivered instantly
- Reduced costs through system automation and streamlined processes
- Easily track employee compliance and progress
- Gain quality feedback from employees for learning improvements
- Simple for staff to book / request to attend courses
- Maintain staff training audit trails
- Upload SCORM files or multiple choice assessments
- Reduced IT resources with a cloud based hosted system
- Empower managers to take ownership of their teams training
Pricing
£11,000 to £200,000 an instance a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 3 1 1 4 1 4 6 1 9 3 6 5 8 5
Contact
accessplanit
Louis Parsloe
Telephone: 01524 389 841
Email: enquiries@accessplanit.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- We recommend only use of any browser released or updated within the last five years.
- System requirements
-
- Internet access
- Use of any modern browser (last 5 years)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Our helpdesk software will send an automated acknowledgement immediately for any questions submitted.
We aim to respond to all questions within two working hours (Monday to Friday 9am to 5pm, excluding Public Holidays) - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- All customers receive the same level, which includes unlimited telephone support (Monday to Friday 9am to 5pm), in-built system help and how-to guides and access to an online helpdesk through which customers are able to view the status of any outstanding queries. All customers are also allocated a Customer Success Manager who will liaise to ensure ongoing satisfaction and capture product improvement suggestions.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We offer all our customers a full implementation package. This package will contain the following activities:
• Project kick off meetings
• Weekly project calls
• Process Mapping Consultation
• Data Builds
• Formal training – this can either be onsite, webinar or a combination
• Training follow up actions
• Project administration work
• Project closure meeting.
The exact number of hours provided by accessplanit will depend upon the package purchased with a minimum of 55 hours support. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- As part of our standard agreement we will provide a backup of the customer database. Alternatively the customer may prefer to export their data into csv or excel using inbuilt system tools.
- End-of-contract process
-
Once the contract has ended we will provide a copy of the most recently backed up version of the database to the customer within 30 days upon request.
Should the customer request that we provide the data in any other specific format then we may be able to accommodate this at an additional cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Our system is built in a responsive design which means it will dynamically resize to fit the screen of any device it's being used on. For example, the main menu will be hidden on a small display and accessed by clicking a menu icon.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
We provide several APIs which offer integration with the following objects within our system:
Users and Accounts (full two way REST integration)
Invoices, Transactions and Credit Notes (fully two way REST integration)
Courses (one way external SOAP based integration, to assist customers synchronising our system with their website to show available courses)
We can provide full API documentation upon request. - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Buyers are able to customise certain areas of the system themselves, including dashboards, terminology changes, registration form creation, custom field creation, reports, workflows, tasks, user permission creation, and more . Most customisation can be done via an administration area which is only accessible with users who have full administration access. Development of specific features are consider on a case by case basis and maybe chargeable.
Scaling
- Independence of resources
- As part of the pre-sales process we will ask a series of questions to determine if the customer would require anything beyond the standard, shared hosting that most customers are given. If so, we can provide quotations for custom hosting packages.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We track any information created, updated or deleted in the system. This includes a log of who made the change, when and what the change was. Customers are given access to these audit logs. We also keep email and SMS logs, including clicks, opens, bounces.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can export data through any datagrid in the system (note that all key modules have associated datagrids). You can choose to filter this information and choose what fields to include in the export. Alternatively, you can use a database reporting tool to create custom exports across any data.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- XML
- Microsoft Word
- Data import formats
-
- CSV
- Other
- Other data import formats
- XML
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- We also support SFTP for file transfers.
Availability and resilience
- Guaranteed availability
- Should the system availability fall below 99.5% in any month then the customer is entitled to apply for Service Credits. These credits will increase depending on the level of downtime experienced. See our full Terms and Conditions for more information.
- Approach to resilience
- Accessplanit software applications are hosted in Microsoft Azure. Hosted in UK based purpose-built data centres. Access is limited to security-cleared personnel which is enforced by CCTV monitoring and access control systems, ensuring a safe and secure environment. Servers are monitored 24 x 7 with onsite technical engineers available. In the event of a mains failure, an advanced uninterruptible power supply (UPS) system provides power to all dedicated servers, while diesel generators are also available which are capable of running the data centre indefinitely.
- Outage reporting
- We use a service that sends an email and triggers a notification through a mobile phone application should any customer system be unresponsive for over five minutes.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Other
- Other user authentication
- Users can be authenticated through ADFS or through SAML.
- Access restrictions in management interfaces and support channels
- Our product has it's own role based security model. All users by default only get the lowest level of access, whereby they are extremely limited in what data they get access to (just their own). For users to be able to see management interfaces they will have be granted a higher access level.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 16/12/2016
- What the ISO/IEC 27001 doesn’t cover
- All processes are covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Accessplanit adheres to all policies and processes as specified by ISO 27001 information security management. Processes are regularly audited and breaches of the policies and processes are treated as a disciplinary offence.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Any product changes have to go through a formal product suggestion and/or change request process which will assess their suitably and benefit to the wider accessplanit community. We have a developer "code review process" ensuring that all developers are working to best practice.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Potential threats are identified through event logging, whereby we monitor server activity. Priority patches are assessed and deployed when necessary, this could be multiple times per day if required. We have team members specifically tasked with following the latest security news.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- All staff are responsible for reporting suspected information security incidents. Monitoring measures are also in place including regular virus and malware scans on all business critical assets. Compromises are defined in order of criticality: low, medium and high. They are responded to in-line with this categorisation.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We have a pre-defined Information Security Incident Procedure in place, which forms part of our IS policy. All staff are responsible for reporting suspected information security incidents. Incidents are reported to the Technical Director. There is a hierarchy defined if the Technical Director is unavailable. Incident reports and subsequent actions are logged within the accessplanit Continuous Improvement system. Copies are provided to all members of the Information Security Committee.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Utilising accessplanit as a platform helps ensure wellbeing by ensuring manual tasks are automated. Improving mental wellness & job satisfaction, aswell as decreasing workload.
Pricing
- Price
- £11,000 to £200,000 an instance a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- We can provide a trial environment which allows users to explore the core system modules.