Meeting Quality Service
Provide a simple capability to capture meeting satisfaction information and to use that to map relationship quality and other business metrics.
Features
- Capture feedback from meetings
- Rate satisfaction and confidence
- Feedback on Governance elements
- Capture actions and risks
- Capture information around 1 to ones
- Receive personal feedback on meeting performance
- See the service document for more
- Understand team personality profiles
Benefits
- Spot relationship problems around any recurring meetings
- Compare confidence and satisfaction from team to customer and leadership
- Track metrics over time and fix trend
- Compare confidence metrics to hard calculated metrics
- Track mood and emotions where physical contact is low
- Customer partner and supplier relationship tracking in key initiatives
- Use AI to offer predictions on wellbeing and success
- Improve meeting and governance outcomes through better relationships
Pricing
£120 to £200 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
7 6 2 3 0 6 2 2 1 7 5 0 9 8 3
Contact
Deep Team
David Dunning
Telephone: 07767803540
Email: info@deepteam.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Not Applicable
- System requirements
- Need a Web Browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 24 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
In addition to remote technical support, support levels are determined by the requirement.
Simple (i.e. super user training);
Adoption (i.e. Simple plus user training plus adoption assistance);
Full change (i.e. Adoption plus current state review, vision and strategy, benefit realisation).
Price based on number of days required to implement.
See related Meeting Services - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Onsite / offsite training, online training and documentation can be provided, in addition to standard service offerings for:
Simple support (training etc)
Full support (adoption)
Change Services (problem to solution and sustainment).
There is a full service set explained in the services document. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- A report and CSV download is provided on a per user basis - it is the user's data (this is because downloading full data for all users violates GDPR).
- End-of-contract process
-
A report and CSV download is provided on a per user basis.
Further needs can be addressed as required (chargeable).
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
-
The API is for administrators to access information through.
The requirements for usage of the API is determined on a case by case basis, and administrators need to be certified (trained) to access the facility. - API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Only the Software Vendor (Meeting Quality) / Service Provider can customise the service.
Scaling
- Independence of resources
-
Good system design and many years experience.
There are internal tools which allow the service provider to spot variances and remedy before users see consequences.
Analytics
- Service usage metrics
- Yes
- Metrics types
- This depends on the service required, but at a minimum each meeting has the number of people invited, responded and absent tracked, plus the results of the standard analysis across all meetings.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- MeetingQuality
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
-
The application with its one-time password is intrinsically secure. A Distributed Denial of Service attack has been specifically addressed with automated reporting/throttling of responses to ensure application integrity. Unusual and suspicious activities are logged and, in most cases and result in a silent disconnect. Logs are automatically sent every day to responsible individuals.
Only two ports are open. Access to data at rest is only available through an admin port and the MeetingQuality port that requires a one time password. Access to the admin port is only available through the incident/release management process which strictly controls access to online machines. - Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- A report and CSV download is provided on a per user basis.
- Data export formats
- CSV
- Data import formats
- Other
- Other data import formats
- No imports are necessary
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- None
- Approach to resilience
-
Information available on request.
All patches from Microsoft are automatically loaded as soon as they become available.
No special category data as defined by GDPR is stored in MeetingQuality machines. - Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
-
Administrator access is only provided to trained users/support partners.
Support design is part of service set up. We recommend adding incident management to a customer help desk.
Ultimately, access to full technical support is open to all users, but this is rarely accessed. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
There are several roles defined within the organisation responsible for security, consisting of:
1. Role 1: Governance, risk and compliance
2. Role 2: Assessments and audits
3. Role 3: Third party risk management
4. Role 4: Incident response
5. Role 5: Business continuity management
6. Role 6: Penetration testing and phishing
7. Role 7: Network security
8. Role 8: Application security
9. Role 9: Data Protection Officer - Information security policies and processes
-
There are several roles defined within the organisation responsible for security, consisting of:
1. Role 1: Governance, risk and compliance
2. Role 2: Assessments and audits
3. Role 3: Third party risk management
4. Role 4: Incident response
5. Role 5: Business continuity management
6. Role 6: Penetration testing and phishing
7. Role 7: Network security
8. Role 8: Application security
9. Role 9: Data Protection Officer
The policies are assured through mentoring, training reporting and audit against:
1. MeetingQuality BYOD and Acceptable Use Policy
2. MeetingQuality Data Classification Policy
3. MeetingQuality Data Protection Policy
4. MeetingQuality SDLC
5. MeetingQuality Security Incident Response Policy
6. MeetingQuality Security Organization
7. MeetingQuality Server Security Policy
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- During Periodic security testing and assurance activities, change and configuration management processes are followed by all personnel as defined in the MeetingQuality Security Organization document and, Role 2: Assessments and audits. These are audited annually.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
See “MeetingQuality Security Organization”. Role 7&8: Network/Application security. These capabilities are audited annually.
Network vulnerabilities are assessed during the annual pen test using NMAP/Wireshark. All servers are automatically updated to the latest Microsoft O/S update.
Software vulnerabilities:
1. Design review with external consultant.
2. Library/component review. Only standard Microsoft Visual Studio c#, Apple xcode or Android Studio development environments used. (A maximum of one version point behind the latest).
3. Static code analysis. Release Management Process demands there must be 0 warnings before migrating software to production. Visual Studio is used for static code analysis.
4. OWASP Top 10 Review. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Information security monitoring and threat detection:
Management of information security monitoring and threat detection is split on functional lines (described in our MeetingQuality Security Organization. Role 7: Network security and Role 8: Application security are specifically tasked with monitoring the network/application respectively. This capability is audited annually.
There is no automated network tools, monitoring is via log reviews.
A Distributed Denial of Service attack has been specifically addressed with automated reporting and throttling of responses to ensure application integrity.
Unusual/suspicious activities are logged and, in most cases, result in silent disconnect. Logs are automatically sent daily to responsible individuals. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Incident management roles are defined in our MeetingQuality Security Organization: Role 4: Incident response.
Access to user support is typically internal within an organisation (via Meeting Organiser then Helpdesk) escalated to a Consulting Partner in a service level (TBC for each implementation). These are tracked with a customers incident management capability.
Sometimes (rarely) Technical Support may be required. It is available through MeetingQuality by email: support@meetingquality.com. Incident reports are provided by email (escalations are very rare)
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
We are actively working to deliver against the Social Value themes. As part of our project delivery, we are working with our customers to plan the delivery in a manner that supports social values and also to deliver outcomes that drive social value wherever possible. For example, we are aiming to deliver outcomes that reduce un-necessary travel and work remotely where this is feasible. - Covid-19 recovery
-
Covid-19 recovery
We are actively working to deliver against the Social Value themes. As part of our project delivery, we are working with our customers to plan the delivery in a manner that supports social values and also to deliver outcomes that drive social value wherever possible. - Tackling economic inequality
-
Tackling economic inequality
We are actively working to deliver against the Social Value themes. As part of our project delivery, we are working with our customers to plan the delivery in a manner that supports social values and also to deliver outcomes that drive social value wherever possible. - Equal opportunity
-
Equal opportunity
Deepteam works with associates and directors who can meet client needs. This is not determined by ethnicity, gender or anything other than capability. We are actively working towards delivering products and outcomes in line with Social Value themes. - Wellbeing
-
Wellbeing
Deepteam works with associates and directors who work hard but are at a level of professionalism and maturity that means they are in a position to work in a manner that supports the wellbeing of everyone involved.
Pricing
- Price
- £120 to £200 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- The whole service is included.