Microsoft Dynamics 365 for Pharmaceutical Industries
Microsoft Dynamics 365 for the pharmaceutical sector optimizes advanced warehousing and logistics. It excels in ensuring industry compliance, seamlessly integrating regulatory standards into operations. With real-time analytics and collaboration tools, it enhances supply chain efficiency, promotes compliance adherence, and elevates overall productivity in pharmaceutical logistics.
Features
- Multi Channel Sales
- Trade price comparison
- Multiple suppliers per product
- Integrated Quality Control Measures
- BoM version management
- Relabelling of medicine
- Dynamic Pricing Strategies
- Surgery Prescription ordering
- Trend Management & Quota Management
- Order prioritisation
Benefits
- Improved Regulatory Compliance Adherence
- Enhanced Supply Chain Efficiency
- Streamlined Manufacturing Processes
- Optimized Inventory Management
- Increased Productivity
- Better Customer Relationship Management
- Reduced Operational Costs
- Enhanced Data Security
- Faster Decision-making with Real-time Insights
- Integration with Existing Systems
Pricing
£1,350 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 2 0 1 7 4 3 0 5 4 5 3 9 8 8
Contact
Reply Limited
Chris Wright
Telephone: 0207 730 6000
Email: glue.frameworks@reply.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- EOur Microsoft Dynamics implementation services embrace the periodic rollout of new features and security updates by Microsoft. These regular updates enhance the functionality, performance, and protection of the Dynamics platform, enabling our clients to leverage the latest advancements. However, buyers should be aware that integrating these new features and updates into their existing implementation may require additional configuration, testing, and training. Our team stays ahead of the curve by proactively monitoring Microsoft's release schedules and planning for the smooth incorporation of new capabilities. We work hand-in-hand with clients to ensure they take full advantage of these enhancements while minimizing disruption.
- System requirements
- Modern Web Browser
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Response times will be agreed as part of a service level agreement with the client.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- Web chat testing protocol will be agreed with the client as part of our service design process.
- Onsite support
- Yes, at extra cost
- Support levels
- We adapt our support to the needs of the users and can offer most support levels requested by clients. We have provided all combinations of first, second, and third line support to our clients; we have provided all combinations of UK business hours, UK extended business hours, US business hours and 24/7 support facilities to our clients. We have provided both real-time telephone support, email support, and on-call support. The costs of each of these models is tailored to the specific needs of our clients to ensure the right level of support is provided to the service in question. In all of our client engagements there will be a dedicated account manager – and typically a cloud support engineer or technical account manager depending on the needs of the client.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide content owner training and materials for the end user that are specific to that implementation of the solution. We have a dedicated Change Management and Adoption team, consisting of a number of PROSCI certified members who work with the ADKAR methodology. We provide Onsite and Online training to both end users and content owners via webinars or workshops. User documentation is tailored to the solution delivered, Videos and Cheat Sheets are delivered to enhance adoption and complement the creative campaigns designed to achieve maximum usage of each Cloud Software solution that Reply deliver.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Powerpoint
- End-of-contract data extraction
-
When a contract ends, users have multiple options to extract their data from Microsoft Dynamics. The platform provides built-in functionalities and tools to facilitate a smooth transition and ensure data portability.
One common method is to use the Dynamics Data Export feature. This allows users to export their data in a structured format, such as Excel or CSV files. Users can select specific entities, fields, and filters to define the scope of the data they wish to extract. The exported files can then be easily imported into other systems or used for further analysis.
For more complex data extraction scenarios, users can leverage the Dynamics API. By making programmatic requests to the API, users can retrieve data from various entities and customize the output format to suit their needs. This approach offers greater flexibility and allows for the extraction of large volumes of data.
It's important to note that data extraction should be planned and executed in collaboration with the Dynamics implementation partner and in accordance with any contractual obligations and data privacy regulations. - End-of-contract process
-
At the end of a Microsoft Dynamics contract, when user licenses expire, individuals will no longer be able to access the system.
Once the contract reaches its termination date, the implementation partner will work closely with the client to identify which user licenses need to be deactivated. This process involves reviewing the list of current users and their roles within the system.
It's crucial to note that the expiration of user licenses does not automatically lead to the deletion or loss of data. The client's data remains securely stored within the Dynamics system, and authorized users with valid licenses can still access and manage the information as needed.
If the client wishes to extract their data from the Dynamics system before the contract ends, they can collaborate with the implementation partner to initiate a data export process. This ensures that the client has a copy of their data for future use or migration to another system.
In some cases, clients may choose to renew or extend their Dynamics contract to maintain uninterrupted access to the system. This allows them to continue leveraging the features and capabilities of Dynamics while ensuring that all users have valid licenses and appropriate access rights.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- N/A
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
-
Our Microsoft Dynamics implementation leverages the powerful API capabilities provided by the platform to enable seamless integration with other systems and custom applications. Users can utilize the API to perform a wide range of actions, such as creating, reading, updating, and deleting records within Dynamics. The API allows for the retrieval of data from various entities, including accounts, contacts, leads, opportunities, and more. Users can also execute complex queries, apply filters, and sort results to obtain specific subsets of data.
Additionally, the API supports the execution of custom actions and workflows, enabling users to automate business processes and extend the functionality of Dynamics. This includes triggering notifications, generating documents, and integrating with external services.
However, it's important to note that the API has certain limitations and security measures in place. Users cannot access data or perform actions that exceed their assigned permissions and roles within Dynamics. The API enforces data integrity and validation rules, preventing users from creating or modifying records with invalid or inconsistent data. Furthermore, the API may have throttling limits to prevent excessive usage and ensure system stability. - API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Users with the appropriate privileges can customize various aspects of the system, including entity fields, forms, views, and workflows, using the built-in customization tools provided by Dynamics.
The drag-and-drop interface enables authorized users to easily modify forms and layouts, adding or removing fields, rearranging sections, and applying conditional formatting. This allows them to streamline data entry and optimize the user experience based on their unique requirements.
Users with necessary permissions can also create custom entities to store and manage data specific to their business processes. These entities can be seamlessly integrated with existing Dynamics modules, such as sales, customer service, and marketing, to provide a holistic view of the organization's operations.
Furthermore, Dynamics supports the creation of custom workflows and business rules to automate repetitive tasks, enforce data consistency, and improve overall efficiency. Users with the appropriate security roles can define triggers, conditions, and actions to route records, send notifications, and update data based on predefined criteria.
For more advanced customizations, users with the required technical expertise and permissions can leverage the power of the Dynamics API and custom code extensions. This allows for the development of bespoke functionalities, integrations with external systems, and the implementation of complex business logic.
Scaling
- Independence of resources
-
The platform utilizes advanced load balancing and resource allocation techniques to distribute the workload efficiently across multiple servers and data centers.
Dynamics employs a multi-tenant architecture, where each organization's data and processes are logically separated and isolated from others. This architecture ensures that the activities and resource consumption of one organization do not impact the performance or availability of the service for other organizations.
Moreover, Microsoft continuously monitors the system's performance and proactively scales the infrastructure to handle increased demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
- While Dynamics lacks built-in service usage metrics, Power BI can be utilized to create customized metric reports. By connecting Power BI to Dynamics, relevant data can be transformed into meaningful visualizations, providing insights into user activity, system performance, and workflow efficiency. Automated data refresh ensures reports remain up-to-date for effective analysis.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
The primary data export formats supported by Dynamics include:
Excel (XLSX): Data can be exported to Microsoft Excel spreadsheets, which provide a familiar and widely compatible format.
Comma-Separated Values (CSV): CSV is a plain text format that stores data in a tabular structure.
XML: Dynamics supports exporting data in XML format, which is a structured and hierarchical markup language.
Data Feeds (OData): Dynamics utilizes the Open Data Protocol (OData) to provide data feeds that can be consumed by other applications.
SQL Database: For more advanced scenarios, data can be exported to a SQL database. - Data export formats
-
- CSV
- ODF
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- Other
- Other protection within supplier network
-
At the core of this model is the concept of user security roles and permissions. Administrators can define granular access rights and assign them to specific user roles, ensuring that individuals only have access to the data and functionality necessary for their job responsibilities.
The role-based security model allows organizations to control access to sensitive information, such as financial data, customer records, and confidential documents.
Furthermore, Dynamics provides an audit trail that tracks user activities and changes made to data. This audit trail enables organizations to monitor and investigate any suspicious or unauthorized actions.
Availability and resilience
- Guaranteed availability
-
Microsoft Dynamics guarantees a high level of availability for its users, with an SLA that promises a minimum of 99.9% uptime.
In the rare event that Microsoft fails to meet this availability commitment, customers may be eligible for a service credit. The service credit is calculated based on the percentage of downtime experienced during a given month, and it is applied as a discount to the customer's subsequent billing period.
The specific details of the service credit are as follows:
- If the monthly uptime percentage falls below 99.9% but remains above 99%, customers are eligible for a 10% service credit.
- If the monthly uptime percentage falls below 99%, customers are eligible for a 25% service credit.
To receive a service credit, customers must submit a claim to Microsoft within a specified timeframe after the month in which the downtime occurred.
It's important to note that certain factors, such as scheduled maintenance, user errors, or external factors beyond Microsoft's control, may be excluded from the availability calculation and service credit eligibility. - Approach to resilience
-
Microsoft Dynamics is designed with resilience and high availability at its core, ensuring that the service remains operational even in the face of disruptions or failures. The platform is built on a robust and redundant infrastructure that spans multiple data centers across different geographical regions.
One key aspect of Dynamics' resilience is its multi-tenant architecture. Each customer's data and environment are logically isolated and run on separate infrastructure, reducing the impact of any single point of failure. If one tenant experiences an issue, it does not affect the performance or availability of other tenants.
Data is continuously replicated across multiple storage units within a data center and across different data centers.
The Dynamics platform also incorporates automatic failover mechanisms.
Microsoft's network infrastructure is designed with redundant paths and multiple internet service providers to ensure reliable connectivity. Load balancing techniques are used to distribute traffic across multiple servers, preventing overload and ensuring optimal performance.
To further enhance resilience, Microsoft conducts regular disaster recovery drills and tests to validate the effectiveness of its business continuity plans. These tests simulate various failure scenarios and help identify and address any potential weaknesses in the system. - Outage reporting
-
The primary method of outage reporting is through the Microsoft 365 Service Health Dashboard. This web-based dashboard provides real-time information about the current status of Dynamics and other Microsoft services. Users can visit the dashboard to view any ongoing incidents, planned maintenance activities, or resolved issues.
In the event of an outage, Microsoft promptly updates the Service Health Dashboard with details about the affected services, the scope of the impact, and the estimated time for resolution. The dashboard also provides regular updates as the Microsoft team works to resolve the issue.
In addition to the Service Health Dashboard, Microsoft communicates outages through email notifications. Administrators or designated contacts within an organization receive email alerts when there is a service disruption or planned maintenance that may impact their Dynamics environment.
Microsoft also leverages social media platforms, such as Twitter, to provide updates on major outages or widespread service disruptions. The official Microsoft Dynamics Twitter account (@MSFTDynamics) is used to share real-time information.
For critical outages that significantly impact users, Microsoft may also utilize additional communication channels, such as the Microsoft 365 Message Center or direct phone calls to key customer contacts, to ensure that important information reaches the affected parties promptly.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Microsoft employs strict access controls and security measures to restrict access to management interfaces and support channels for the Dynamics platform. Access is granted based on the principle of least privilege, ensuring that users have only the permissions necessary to perform their roles. Multi-factor authentication is enforced for all administrative access, adding an extra layer of security. Support channels, such as the Azure portal and Microsoft Support, require secure authentication and authorize access based on predefined roles and permissions. All access activities are logged and monitored for suspicious behavior. Regular access reviews and audits are conducted ensuring compliance with policies.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International
- ISO/IEC 27001 accreditation date
- 23/06/2017
- What the ISO/IEC 27001 doesn’t cover
- Covers: IT and Business Consultancy
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We adhere to a comprehensive set of information security policies and processes to ensure the confidentiality, integrity, and availability of our systems and data. Our policies cover areas such as data protection, access control, incident response, and compliance with relevant regulations and standards. Our reporting structure includes designated information security officers responsible for overseeing the implementation and enforcement of these policies. We ensure policies are followed through regular audits, assessments, and compliance reviews conducted by internal and external auditors. Additionally, we provide ongoing training and awareness programs to educate employees about their responsibilities regarding information security and reinforce compliance with our policies. Incident response procedures are in place to address any security incidents promptly, with post-incident reviews conducted to identify lessons learned and areas for improvement. Overall, our robust information security framework ensures that policies are effectively implemented, monitored, and enforced to safeguard our systems and data.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Microsoft follows stringent configuration and change management processes for the Dynamics platform, aligning with industry best practices like ITIL. Configuration management involves identifying, baselining, controlling, and monitoring platform components. Change management includes formal change requests, reviews, testing, scheduling, implementation, and post-implementation reviews. Changes are assessed by a Change Advisory Board and thoroughly tested before deployment. Microsoft complies with standards such as ISO/IEC 20000, SOC, PCI DSS, and HIPAA. Regular audits ensure compliance with internal policies and regulations. These processes minimize risk, maintain system stability, and provide customers with confidence in the reliability and integrity of the Dynamics platform.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Microsoft employs a vulnerability management process for the Dynamics platform. This process involves continuous scanning and monitoring of the system for potential vulnerabilities using advanced security tools and techniques. Identified vulnerabilities are promptly assessed, prioritized based on their severity and potential impact, and assigned to the relevant teams for remediation. Microsoft follows a structured approach for patching and updating the platform to address vulnerabilities, ensuring minimal disruption to users. Regular vulnerability assessments, penetration testing, and collaboration with the security research community help identify and mitigate risks proactively. Microsoft's vulnerability management process is an integral part of its overall security strategy.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Microsoft's protective monitoring processes for Dynamics are designed to identify and respond to potential compromises promptly. The platform is continuously monitored using advanced security tools, anomaly detection mechanisms, and threat intelligence feeds. When a potential compromise is identified, Microsoft's Security Operations Center (SOC) analyzes the incident to determine its scope and impact. The SOC follows a well-defined incident response plan, which includes containment, eradication, and recovery steps. Microsoft aims to respond to critical incidents within minutes, with a dedicated team working 24/7 to investigate and resolve the issue. Regular incident response drills and collaboration with external security experts.
- Incident management type
- Undisclosed
- Incident management approach
- We have pre-defined processes in place for common events, which are documented in our incident management framework. Users can report incidents through various channels, including dedicated incident reporting forms on our platform, email, or through our customer support channels. Once an incident is reported, our incident response team assesses the severity and initiates the appropriate response procedures based on predefined criteria. Throughout resolution, we provide regular updates and communication to affected users, keeping them informed of progress and expected resolution times. After the incident is resolved, we conduct a thorough post-incident analysis to identify root causes and implement preventive measures.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Microsoft employs strict access controls and security measures to restrict access to management interfaces and support channels for the Dynamics platform. Access is granted based on the principle of least privilege, ensuring that users have only the permissions necessary to perform their roles. Multi-factor authentication is enforced for all administrative access, adding an extra layer of security. Support channels, such as the Azure portal and Microsoft Support, require secure authentication and authorize access based on predefined roles and permissions. All access activities are logged and monitored for suspicious behavior. Regular access reviews and audits are conducted ensuring compliance with policies.Covid-19 recovery
Our commitment to social value is integral to our values as a business built on an ethical approach demonstrating Glue Reply’s reliability, transparency and honesty.
We can support the buyer to deliver against the Social Value Model Theme of COVID-19 recovery through provision of employment opportunities and implementation of people health initiatives to help local communities manage and recover from COVID-19.
We have implemented initiatives to promote opportunities for those who face barriers to employment;
- Enrolled into the Nuffield Research Placement scheme (funded by Nuffield Foundation) to provide placements to disadvantaged and deprived year 12 students providing research opportunities. Individuals who perform well are offered a Degree Apprenticeship place.
- Run a Degree Apprenticeship scheme where we use Generation (a not-for-profit) to cross-train individuals from deprived backgrounds, without necessarily STEM backgrounds in technology. We partnered with Google who commit to provide engineering engagements and training and development on Google Cloud Platform related technologies.
As a responsible employer we have implemented the 6 standards of the Mental Health at Work Commitment, we support our employees no matter what situation they face and have appropriate structures for them to speak to neutral experts 24x7. Both employees and managers are trained on mental health. Post-COVID we actively promote physical activities and have revised working practices to inspire each employee to make their own choices to find their ideal work-life balance.
At the start of the engagement we will agree the initiatives to implement, incorporate the agreed social value milestones into the wider programme and manage them alongside all other deliverables. A detailed project plan will be prepared and key performance measurements agreed to monitor the progress of the social value initiatives. We incorporate social value implementation and monitoring into the role of the Client Director.Tackling economic inequality
Our commitment to social value is integral to our values as a business built on an ethical approach demonstrating Glue Reply’s reliability, transparency and honesty.
We can support the buyer to deliver against the Social Value Model Theme of Tackling Economic Inequality through provision of new business, new jobs and skills and incresaing supply chain resilience and capacity.
We have implemented initiatives to promote opportunities for those who face barriers to employment;
- Enrolled into the Nuffield Research Placement scheme (funded by Nuffield Foundation) to provide placements to disadvantaged and deprived year 12 students providing research opportunities. Individuals who perform well are offered a Degree Apprenticeship place.
- Run a Degree Apprenticeship scheme where we use Generation (a not-for-profit) to cross-train individuals from deprived backgrounds, without necessarily STEM backgrounds in technology. We partnered with Google who commit to provide engineering engagements and training and development on Google Cloud Platform related technologies.
- Run a Code for Kids initiative where we work with schools to teach over 3,000 children across a broad range of schools how to program.
We have a Supplier Code of Conduct and all our suppliers must comply in the areas of labour law and human rights, worker safety and environmental sustainability. Reply operates as set of SME type companies and we understand the benefits that this these organisations can bring and we often select SME’s as part of our supply chain
At the start of the engagement we will agree the initiatives to implement, incorporate the agreed social value milestones into the wider programme and manage them alongside all other deliverables. A detailed project plan will be prepared and key performance measurements agreed to monitor the progress of the social value initiatives. We incorporate social value implementation and monitoring into the role of the Client Director.Equal opportunity
Our commitment to social value is integral to our values as a business built on an ethical approach demonstrating Glue Reply’s reliability, transparency and honesty.
We can support the buyer to deliver against the Social Value Model Theme of Equal Opportunity through tackling workforce inequality, identifying and managing the risks of modern slavery and increasing representation of disabled people.
Glue Reply is committed to promoting equality and diversity and promoting a culture where we actively value difference and recognise people from different backgrounds and experiences bring valuable workplace insights and enhance the way we work. Making everyone feel equally involved and supported results in rewarding work experiences and fuels innovation.
We make employment decisions based on merit, qualifications and competence. Our workforce has high cultural diversity, above industry standards, and has higher levels of gender diversity than industry averages. We have a strong equality ethos and run a genuine meritocracy where individuals are assessed solely on their performance and how their contribution has helped further the organisation.
We are committed to preventing modern slavery in our corporate activities and supply chains.
We have implemented initiatives to promote opportunities to identify and tackle inequality in employment, skills and pay in the workforce.;
• Founding signatory of the Tech Talent Charter
• Women in Technology social network organises events and has an active community.
• Donated some of our BCS Corporate Membership places to Coding Black Females
At the start of the engagement we will agree the initiatives to implement, incorporate the agreed social value milestones into the wider programme and manage them alongside all other deliverables. A detailed project plan will be prepared and key performance measurements agreed to monitor the progress of the social value initiatives. We incorporate social value implementation and monitoring into the role of the Client Director.Wellbeing
Our commitment to social value is integral to our values as a business built on an ethical approach demonstrating Glue Reply’s reliability, transparency and honesty.
We can support the buyer to deliver against the Social Value Model Theme of Wellbeing through supporting the physical and mental health of the rowkforce and community.
As a responsible employer we have implemented the 6 standards of the Mental Health at Work Commitment, we support our employees no matter what situation they face and have appropriate structures for them to speak to neutral experts 24x7. Both employees and managers are trained on mental health.
We perform assessments on wellbeing regularly and our significant annual report on this covers a wide range of dimensions across the business. We present the findings to all employees whilst keeping individual information 100% confidential. We then have our focus group working on these results to drive a culture of continuous improvement
Post-COVID we actively promote physical activities and have revised working practices to inspire each employee to make their own choices to find their ideal work-life balance.
• Our active challenge on Strava rewards employees for taking breaks. For every mile they walk or run we give £1 to charity, with an extra £5 every time during work hours. #WorkLifeBalance has driven an active work-life balance culture with >70% peak uptake.
• Our staff also have access to on-line yoga and fitness programmes.
At the start of the engagement we will agree the initiatives to implement, incorporate the agreed social value milestones into the wider programme and manage them alongside all other deliverables. A detailed project plan will be prepared and key performance measurements agreed to monitor the progress of the social value initiatives. We incorporate social value implementation and monitoring into the role of the Client Director.
Pricing
- Price
- £1,350 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No