accessplanit LMS

accessplanit LMS is a cloud software solution purpose built to automate end-to-end learning administration and provide an engaging employee journey with self-service user and manager portals and to help manage compliance via in-depth reporting. Implementation, system training, Support Helpdesk and a dedicated Customer Success Manager for system usage optimisation included.


  • Scheduling and management of multiple course types (SCORM, xAPI compliant)
  • Online, personalised user portal with booking facility (optional approval function)
  • Track learning progress and compliance, including automated expiry reminders
  • CPD management
  • Real time reporting which can be exported, shared and scheduled
  • Evaluations and surveys
  • Automated, triggered email and SMS communications such as course reminders
  • Tasks and reminders
  • A powerful workflow engine to automate actions
  • Accessible 24/7 from any device


  • Empower employees by giving access to own learning and development
  • Training and documentation can be delivered instantly
  • Reduced costs through system automation and streamlined processes
  • Easily track employee compliance and progress
  • Gain quality feedback from employees for learning improvements
  • Simple for staff to book / request to attend courses
  • Maintain staff training audit trails
  • Upload SCORM files or multiple choice assessments
  • Reduced IT resources with a cloud based hosted system
  • Empower managers to take ownership of their teams training


£11,000 to £200,000 an instance a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

7 5 1 4 4 6 0 3 0 6 1 2 2 4 7


accessplanit Louis Parsloe
Telephone: 01524 389 841

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
We recommend only use of any browser released or updated within the last five years.
System requirements
  • Internet access
  • Use of any modern browser (last 5 years)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our helpdesk software will send an automated acknowledgement immediately for any questions submitted.
We aim to respond to all questions within two working hours (Monday to Friday 9am to 5pm, excluding Public Holidays)
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
All customers receive the same level, which includes unlimited telephone support (Monday to Friday 9am to 5pm), in-built system help and how-to guides and access to an online helpdesk through which customers are able to view the status of any outstanding queries. All customers are also allocated a Customer Success Manager who will liaise to ensure ongoing satisfaction and capture product improvement suggestions.
Support available to third parties

Onboarding and offboarding

Getting started
We offer all our customers a full implementation package. This package will contain the following activities:

• Project kick off meetings
• Weekly project calls
• Process Mapping Consultation
• Data Builds
• Formal training – this can either be onsite, webinar or a combination
• Training follow up actions
• Project administration work
• Project closure meeting.

The exact number of hours provided by accessplanit will depend upon the package purchased with a minimum of 55 hours support.
Service documentation
Documentation formats
End-of-contract data extraction
As part of our standard agreement we will provide a backup of the customer database. Alternatively the customer may prefer to export their data into csv or excel using inbuilt system tools.
End-of-contract process
Once the contract has ended we will provide a copy of the most recently backed up version of the database to the customer within 30 days upon request.
Should the customer request that we provide the data in any other specific format then we may be able to accommodate this at an additional cost.

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Our system is built in a responsive design which means it will dynamically resize to fit the screen of any device it's being used on. For example, the main menu will be hidden on a small display and accessed by clicking a menu icon.
Service interface
User support accessibility
None or don’t know
What users can and can't do using the API
We provide several APIs which offer integration with the following objects within our system:
Users and Accounts (full two way REST integration)
Invoices, Transactions and Credit Notes (fully two way REST integration)
Courses (one way external SOAP based integration, to assist customers synchronising our system with their website to show available courses)
We can provide full API documentation upon request.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Buyers are able to customise certain areas of the system themselves, including dashboards, terminology changes, registration form creation, custom field creation, reports, workflows, tasks, user permission creation, and more . Most customisation can be done via an administration area which is only accessible with users who have full administration access. Development of specific features are consider on a case by case basis and maybe chargeable.


Independence of resources
As part of the pre-sales process we will ask a series of questions to determine if the customer would require anything beyond the standard, shared hosting that most customers are given. If so, we can provide quotations for custom hosting packages.


Service usage metrics
Metrics types
We track any information created, updated or deleted in the system. This includes a log of who made the change, when and what the change was. Customers are given access to these audit logs. We also keep email and SMS logs, including clicks, opens, bounces.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export data through any datagrid in the system (note that all key modules have associated datagrids). You can choose to filter this information and choose what fields to include in the export. Alternatively, you can use a database reporting tool to create custom exports across any data.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • PDF
  • XML
  • Microsoft Word
Data import formats
  • CSV
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
We also support SFTP for file transfers.

Availability and resilience

Guaranteed availability
Should the system availability fall below 99.5% in any month then the customer is entitled to apply for Service Credits. These credits will increase depending on the level of downtime experienced. See our full Terms and Conditions for more information.
Approach to resilience
Accessplanit software applications are hosted in Microsoft Azure. Hosted in UK based purpose-built data centres. Access is limited to security-cleared personnel which is enforced by CCTV monitoring and access control systems, ensuring a safe and secure environment. Servers are monitored 24 x 7 with onsite technical engineers available. In the event of a mains failure, an advanced uninterruptible power supply (UPS) system provides power to all dedicated servers, while diesel generators are also available which are capable of running the data centre indefinitely.
Outage reporting
We use a service that sends an email and triggers a notification through a mobile phone application should any customer system be unresponsive for over five minutes.

Identity and authentication

User authentication needed
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
Users can be authenticated through ADFS or through SAML.
Access restrictions in management interfaces and support channels
Our product has it's own role based security model. All users by default only get the lowest level of access, whereby they are extremely limited in what data they get access to (just their own). For users to be able to see management interfaces they will have be granted a higher access level.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
All processes are covered.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Accessplanit adheres to all policies and processes as specified by ISO 27001 information security management. Processes are regularly audited and breaches of the policies and processes are treated as a disciplinary offence.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Any product changes have to go through a formal product suggestion and/or change request process which will assess their suitably and benefit to the wider accessplanit community. We have a developer "code review process" ensuring that all developers are working to best practice.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Potential threats are identified through event logging, whereby we monitor server activity. Priority patches are assessed and deployed when necessary, this could be multiple times per day if required. We have team members specifically tasked with following the latest security news.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All staff are responsible for reporting suspected information security incidents. Monitoring measures are also in place including regular virus and malware scans on all business critical assets. Compromises are defined in order of criticality: low, medium and high. They are responded to in-line with this categorisation.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have a pre-defined Information Security Incident Procedure in place, which forms part of our IS policy. All staff are responsible for reporting suspected information security incidents. Incidents are reported to the Technical Director. There is a hierarchy defined if the Technical Director is unavailable. Incident reports and subsequent actions are logged within the accessplanit Continuous Improvement system. Copies are provided to all members of the Information Security Committee.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks

Social Value

Equal opportunity

Equal opportunity

accessplanit is committed to achieving a working environment which provides equality of opportunity and freedom from unlawful discrimination on the grounds of race, sex, pregnancy and maternity, marital or civil partnership status, gender reassignment, disability, religion or beliefs, age or sexual orientation. This Policy aims to remove unfair and discriminatory practices within the Company and to encourage full contribution from its diverse community. The Company is committed to actively opposing all forms of discrimination.

The Company also aims to provide a service that does not discriminate against its clients and customers in the means by which they can access the services and goods supplied by the Company. The Company believes that all employees and clients are entitled to be treated with respect and dignity.

Any and all personal data used in connection with this Policy shall be collected, held, and processed in accordance with the Company’s Data Protection Policy.


£11,000 to £200,000 an instance a year
Discount for educational organisations
Free trial available
Description of free trial
We can provide a trial environment which allows users to explore the core system modules.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.