Deep Team

Meeting Quality Service

Provide a simple capability to capture meeting satisfaction information and to use that to map relationship quality and other business metrics.

Features

  • Capture feedback from meetings
  • Rate satisfaction and confidence
  • Feedback on Governance elements
  • Capture actions and risks
  • Capture information around 1 to ones
  • Receive personal feedback on meeting performance
  • See the service document for more
  • Understand team personality profiles

Benefits

  • Spot relationship problems around any recurring meetings
  • Compare confidence and satisfaction from team to customer and leadership
  • Track metrics over time and fix trend
  • Compare confidence metrics to hard calculated metrics
  • Track mood and emotions where physical contact is low
  • Customer partner and supplier relationship tracking in key initiatives
  • Use AI to offer predictions on wellbeing and success
  • Improve meeting and governance outcomes through better relationships

Pricing

£120 to £200 a licence a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@deepteam.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

7 6 2 3 0 6 2 2 1 7 5 0 9 8 3

Contact

Deep Team David Dunning
Telephone: 07767803540
Email: info@deepteam.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Not Applicable
System requirements
Need a Web Browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 24 hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
In addition to remote technical support, support levels are determined by the requirement.
Simple (i.e. super user training);
Adoption (i.e. Simple plus user training plus adoption assistance);
Full change (i.e. Adoption plus current state review, vision and strategy, benefit realisation).
Price based on number of days required to implement.
See related Meeting Services
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite / offsite training, online training and documentation can be provided, in addition to standard service offerings for:
Simple support (training etc)
Full support (adoption)
Change Services (problem to solution and sustainment).
There is a full service set explained in the services document.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
A report and CSV download is provided on a per user basis - it is the user's data (this is because downloading full data for all users violates GDPR).
End-of-contract process
A report and CSV download is provided on a per user basis.
Further needs can be addressed as required (chargeable).

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
The API is for administrators to access information through.
The requirements for usage of the API is determined on a case by case basis, and administrators need to be certified (trained) to access the facility.
API documentation
Yes
API documentation formats
Other
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Only the Software Vendor (Meeting Quality) / Service Provider can customise the service.

Scaling

Independence of resources
Good system design and many years experience.
There are internal tools which allow the service provider to spot variances and remedy before users see consequences.

Analytics

Service usage metrics
Yes
Metrics types
This depends on the service required, but at a minimum each meeting has the number of people invited, responded and absent tracked, plus the results of the standard analysis across all meetings.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
MeetingQuality

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
The application with its one-time password is intrinsically secure. A Distributed Denial of Service attack has been specifically addressed with automated reporting/throttling of responses to ensure application integrity. Unusual and suspicious activities are logged and, in most cases and result in a silent disconnect. Logs are automatically sent every day to responsible individuals.

Only two ports are open. Access to data at rest is only available through an admin port and the MeetingQuality port that requires a one time password. Access to the admin port is only available through the incident/release management process which strictly controls access to online machines.
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
A report and CSV download is provided on a per user basis.
Data export formats
CSV
Data import formats
Other
Other data import formats
No imports are necessary

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
None
Approach to resilience
Information available on request.

All patches from Microsoft are automatically loaded as soon as they become available.

No special category data as defined by GDPR is stored in MeetingQuality machines.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Administrator access is only provided to trained users/support partners.

Support design is part of service set up. We recommend adding incident management to a customer help desk.

Ultimately, access to full technical support is open to all users, but this is rarely accessed.
Access restriction testing frequency
At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
There are several roles defined within the organisation responsible for security, consisting of:
1. Role 1: Governance, risk and compliance
2. Role 2: Assessments and audits
3. Role 3: Third party risk management
4. Role 4: Incident response
5. Role 5: Business continuity management
6. Role 6: Penetration testing and phishing
7. Role 7: Network security
8. Role 8: Application security
9. Role 9: Data Protection Officer
Information security policies and processes
There are several roles defined within the organisation responsible for security, consisting of:
1. Role 1: Governance, risk and compliance
2. Role 2: Assessments and audits
3. Role 3: Third party risk management
4. Role 4: Incident response
5. Role 5: Business continuity management
6. Role 6: Penetration testing and phishing
7. Role 7: Network security
8. Role 8: Application security
9. Role 9: Data Protection Officer
The policies are assured through mentoring, training reporting and audit against:
1. MeetingQuality BYOD and Acceptable Use Policy
2. MeetingQuality Data Classification Policy
3. MeetingQuality Data Protection Policy
4. MeetingQuality SDLC
5. MeetingQuality Security Incident Response Policy
6. MeetingQuality Security Organization
7. MeetingQuality Server Security Policy

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
During Periodic security testing and assurance activities, change and configuration management processes are followed by all personnel as defined in the MeetingQuality Security Organization document and, Role 2: Assessments and audits. These are audited annually.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
See “MeetingQuality Security Organization”. Role 7&8: Network/Application security. These capabilities are audited annually.
Network vulnerabilities are assessed during the annual pen test using NMAP/Wireshark. All servers are automatically updated to the latest Microsoft O/S update.
Software vulnerabilities:
1. Design review with external consultant.
2. Library/component review. Only standard Microsoft Visual Studio c#, Apple xcode or Android Studio development environments used. (A maximum of one version point behind the latest).
3. Static code analysis. Release Management Process demands there must be 0 warnings before migrating software to production. Visual Studio is used for static code analysis.
4. OWASP Top 10 Review.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Information security monitoring and threat detection:
Management of information security monitoring and threat detection is split on functional lines (described in our MeetingQuality Security Organization. Role 7: Network security and Role 8: Application security are specifically tasked with monitoring the network/application respectively. This capability is audited annually.

There is no automated network tools, monitoring is via log reviews.

A Distributed Denial of Service attack has been specifically addressed with automated reporting and throttling of responses to ensure application integrity.

Unusual/suspicious activities are logged and, in most cases, result in silent disconnect. Logs are automatically sent daily to responsible individuals.
Incident management type
Supplier-defined controls
Incident management approach
Incident management roles are defined in our MeetingQuality Security Organization: Role 4: Incident response.

Access to user support is typically internal within an organisation (via Meeting Organiser then Helpdesk) escalated to a Consulting Partner in a service level (TBC for each implementation). These are tracked with a customers incident management capability.

Sometimes (rarely) Technical Support may be required. It is available through MeetingQuality by email: support@meetingquality.com. Incident reports are provided by email (escalations are very rare)

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

We are actively working to deliver against the Social Value themes. As part of our project delivery, we are working with our customers to plan the delivery in a manner that supports social values and also to deliver outcomes that drive social value wherever possible. For example, we are aiming to deliver outcomes that reduce un-necessary travel and work remotely where this is feasible.
Covid-19 recovery

Covid-19 recovery

We are actively working to deliver against the Social Value themes. As part of our project delivery, we are working with our customers to plan the delivery in a manner that supports social values and also to deliver outcomes that drive social value wherever possible.
Tackling economic inequality

Tackling economic inequality

We are actively working to deliver against the Social Value themes. As part of our project delivery, we are working with our customers to plan the delivery in a manner that supports social values and also to deliver outcomes that drive social value wherever possible.
Equal opportunity

Equal opportunity

Deepteam works with associates and directors who can meet client needs. This is not determined by ethnicity, gender or anything other than capability. We are actively working towards delivering products and outcomes in line with Social Value themes.
Wellbeing

Wellbeing

Deepteam works with associates and directors who work hard but are at a level of professionalism and maturity that means they are in a position to work in a manner that supports the wellbeing of everyone involved.

Pricing

Price
£120 to £200 a licence a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
The whole service is included.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@deepteam.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.