Informu Information Asset Register and Management System
The Informu Information Asset Register / Management system stores asset data gathered during an information / system audit, as well as managing your Records of Processing Activities. It also stores your records retention policies, to which assets are tagged. You can keep an audit trail of actions related to assets.
Features
- Asset Collections as business process records or GDPR ROPA data
- Create up to 8 different Assets Types with field templates
- Business Classification Scheme of functions, activities, aligned to retention policies
- Maintain retention policies, across multiple jurisdictions as required
- Tag retention policies to assets with inheritance via BCS
- Establish user security permissions based on roles
- Create and manage fields, including drop down lists
- Search and reporting with report data export and graphical dashboard
- Report writer
- Task management, notifications, approval workflow and audit trail of actions
Benefits
- Support Data Protection legislation and AI regulation compliance
- Identify and address information risks
- Plan Records Management processes and approaches
- Support ISO 27001 compliance
- Support maintenance and implementation of retention policies, logging actions
- Support Business Continuity Planning
- Understand paper holdings, plan office sweeps, moves and changes
- Maintain application software and IT equipment inventory
- Support e-Discovery
- Support knowledge awareness and discovery
Pricing
£3,600.00 to £7,800.00 an instance a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 6 5 1 3 7 8 1 3 1 3 2 1 0 4
Contact
INFORMU SOLUTIONS LIMITED
Reynold Leming
Telephone: 07966397417
Email: reynold@informu-solutions.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- All scheduled maintenance will occur outside of standard office hours. Notification prior to software updates can be set to any number of days or weeks as required by the customer, except for critical updates. Software updates and maintenance can be deferred as required by the customer, except for critical updates and emergency maintenance.
- System requirements
- Up to date web browser access for users
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Email support is provided. Target for acknowledgement and initial diagnosis within 1 hour between the hours of 09:00 hrs and 17:00 hrs, Monday to Friday, excluding UK public holidays.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support is included within the annual software service fee. Engineering alerts for servers are provided on a 24/7 basis and will be reviewed during working hours on the next day. Application software support is provided between the hours of 09:00 hrs and 17:00 hrs, Monday to Friday, excluding UK public holidays. A named technical account manager will be nominated.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- A full range of services can be provided including requirements analysis and advice, configuration, data preparation and import, training, support and maintenance. The system is provided with tool tips, user and administrator documentation, as well as useful guides to support configuration and asset audits etc. We can also undertake information and physical asset audits.
- Service documentation
- Yes
- Documentation formats
-
- ODF
- End-of-contract data extraction
- Back-ups of the SQL data can be uploaded to an FTP server nominated by the customer.
- End-of-contract process
- Back-ups of the SQL data can be uploaded to an FTP server nominated by the client. Once this has been completed and accepted, the data on the production server will be securely expunged and the server decommissioned. Unless there are more complex additional requests, this is part of the standard annual fee.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Depending on role based permission sets, users can access and process tasks, access and filter information asset lists, view or edit assets, log actions against assets, undertake searches and run reports. There are systems administration capabilities to manage retention policies, the business classification scheme, custom reports, dashboard graphics, asset types, fields and lists, users, password strength, system alerts, help text, colour schemes etc.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Commands have icons, drop down lists have large buttons, interface and text is scalable, options for hover over and in-page help text.
- Accessibility testing
- None.
- API
- No
- Customisation available
- Yes
- Description of customisation
- Depending on role based permission sets, there are systems administration capabilities to manage retention policies, the business classification scheme, custom reports, dashboard graphics, asset types, fields and lists for assets and collections, users, password strength, system alerts, help text, colour schemes.
Scaling
- Independence of resources
- System performance and response times are heavily dependent on the client network environment, internet connection and number of concurrent users. We monitor our software performance closely and will deal with any unforeseen issues as a priority. Subject to this there is a 99.99% up-time guarantee, excluding scheduled maintenance.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Reports can be provided based upon a format agreed with the customer.
- Reporting types
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Never
- Protecting data at rest
-
- Physical access control, complying with another standard
- Other
- Other data at rest protection approach
- TLS 1.2 and SQL Server
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- There is the ability to export the Information Asset Register report data to PDF, Word and Excel.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- MS Word
- MS Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
- MS Excel Spreadsheet
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- System performance and response times are heavily dependent on the client network environment, internet connection and number of concurrent users. We monitor our software performance closely and will deal with any unforeseen issues as a priority. Subject to this there is a 99.99% up-time guarantee, excluding scheduled maintenance. Refunding is not offered.
- Approach to resilience
- The servers are distinct, fully managed units dedicated solely to the service we provide.
- Outage reporting
- Email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
- Via user name and password. 2 factor authentication is via email. Password complexity rules can be set up based on customer standards.
- Access restrictions in management interfaces and support channels
- SSH Secure channel access, with locking to specific IP addresses
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
- Via user name and password, 2 factor authentication via email and password complexity rules
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
-
The company has policies and processes relating to:
* Information Security
* Business Continuity
* Bring Your Own Device
* Acceptable Computer Use
* Security Incident Management
* IT Systems Security
* Data Protection
* Supplier Vetting
The data centres provide maximum security, with access strictly limited to cleared personnel and monitored by extensive CCTV and access control systems. A comprehensive range of physical security measures are in place to guarantee the safety of data:
* CCTV covering all areas of the data centres and corporate offices
* Highly experienced security guards on duty 24/7, 365 days a year
* Role-based access control swipe-card system across multiple secure areas to ensure absolutely no access by unauthorised personnel
In terms of the boxes themselves:
the servers are distinct units dedicated solely to the service we provide, and managed directly by us, ensuring that nothing else running on them can jeopardise their security. They are firewalled to allow higher-level access only to a specific range of physical locations, and the software itself manages access over an SSL connection.
Relevant ISO and Cloud security standards for the hosting location can be provided on request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Formal change management for system changes and updates are not implemented by default, but can be discussed if required. Applying and configuring service packs, security patches and software updates to the SaaS server occurs on a proactive basis as part of the provision of a fully managed service. Data Protection Impact Assessments can be performed on customer request.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our hosted SaaS service operates in a cloud environment with vulnerability checking controls. We are wholly responsible for the machines and software, and so scan them regularly for issues using standard MS server technologies. We follow security and information governance best practices. Applying and configuring service packs, security patches and software updates to the SaaS server occurs on a proactive basis as part of the provision of a fully managed service. Relevant ISO and Cloud security standards for the hosting location and provider can be provided on request. They conduct regular security tests on their infrastructure.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
The data centres provide maximum security:
* CCTV covering all areas of the data centres and corporate offices
* Highly experienced security guards on duty 24/7, 365 days a year
* Role-based access control swipe-card system across multiple secure areas to ensure absolutely no access by unauthorised personnel.
The servers are distinct units dedicated solely to the service we provide, and managed directly by us, ensuring that nothing else running on them can jeopardise their security. They are firewalled to allow higher-level access only to a specific range of physical locations, and software itself manages access over an SSL connection. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Incidents identified internally will be handled and escalated according to standard procedures; incidents identified by customers may be reported by telephone or e-mail. Incidents will be categorised and managed according to their nature and the type of data affected:
The Breach Management Plan addresses:
1. Containment and recovery.
2. Assessment of ongoing risk.
3. Notification of breach.
4. Evaluation and response.
Full logs of incidents are recorded and retained. Reporting processes will be agreed with the customer.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Based on our Environmental and Sustainability Policy. We also provide a number of services to support ethical and environmental best practice in the dispersing of workplace furniture and IT assets. This includes donation, reuse and resale. We also undertake the ethical mining and reuse of earth elements from ICT equipment. Informu is Good Business Charter accredited for ESG and we also undertake separate ESG consultancy services for clients, where we put the fight against climate change at the heart of our recommendations.Covid-19 recovery
As part of our strategy for social value, we support a variety of community activities, including sponsoring a 5-a-side football team and supporting a local theatre. We also facilitate the donation of used customer furniture and IT assets to charities and not for profit organisations, including youth clubs, day centres and other activity groups for a range of ages.Tackling economic inequality
We pay fair rates, taking into account the real living wage. We also facilitate the donation of used customer furniture and IT assets to a wide range of charities and not-for-profit organisations.Equal opportunity
Based on our Equal Opportunities Policy, we apply non-discrimination to the process of recruitment and selection, promotion, training, conditions of work, pay and benefits and to every other aspect of employment. Likewise, we apply the same principles in our sourcing strategy for suppliers.Wellbeing
Our Mental Health & Wellbeing Strategy is based on 5 key components:
1. Work-life balance
2. Health & Safety
3. Employee growth & development
4. Employee recognition
5. Employee involvement
Additionally, we undertake periodic Staff Wellness Surveys. Our Essex premises were chosen due to its multi-faceted approach to employee health and wellbeing, including break-out areas, an on-site gym and overall focus on community activity for tenants and locally.
Pricing
- Price
- £3,600.00 to £7,800.00 an instance a year
- Discount for educational organisations
- Yes
- Free trial available
- No