AssessNET Hazard Reporting Module
AssessNET's Hazard Reporting Module empowers you to record and manage Hazards, ideally in conjunction with AssessNET’s Portal module. Users can rapidly enter details of hazards in the workplace, along with photos and videos, alerting the responsible person. Assign remedial actions and track progress directly from the Hazard itself.
Features
- Real-time reporting, upload supporting documents photos and videos
- Pre-defined measures assist with creating corrective actions
- Hazard profiling - can be grouped together for an activity
- Hazards risk-rated according to area
- Distribute alerts automatically
- Integrated task management, assign and monitor remedial actions
- Custom API services
- Federation services (single sign-on)
- UKAS Accredited ISO27001:2013 and ISO9001 by BSI
- Riskex Health and Safety Consultancy and Training services available
Benefits
- Designed for rapid entry of hazard information in the workplace
- Works in conjunction with Accident/Incident module
- Generate statistical analysis of recorded data - analyse trends
- Produce graphical representations of recorded data
- Automatic archiving
- Remote access from anywhere
- Protect data with strict security measures
- Resource Savings - save time and money
- Fully integrated
- Free Upgrades
Pricing
£9,995 an instance a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 7 5 1 2 0 6 9 3 6 6 7 1 2 6
Contact
Riskex Ltd
Linda Kemp
Telephone: +44 1908 915272
Email: Sales@riskex.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Not Applicable
- System requirements
-
- Modern Web Browser
- Internet Connectivity
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Next business working day.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We have a standard support level for all clients, regardless of business or contract size. A dedicated support team are on hand during normal business hours to answer and resolve any queries users may have.
Our service can be configured to restrict support requests to a clients dedicated support desk, if required.
All clients are allocated an account manager who is available to assist with any resolutions required.
Our service guarantees a 99.9% uptime per calendar month, allowing for scheduled maintenance to take place. All maintenance takes place outside of normal office hours, with appropriate notice given. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
All on-boarding clients are allocated an account manager and implementation manager who will ensure the smooth transition onto the service. An initial implementation meeting will be scheduled to ensure that our team understand your requirements.
Our team will work with you to capture the core data required by the system. A standard administrative training session will take place to educate the key stakeholders in the management of the service.
Training provision can be either onsite or online, or a combination of both. Our team will work with you to tailor training sessions to your requirements, covering train-the-trainer sessions; specific modules; or more general system overviews. As peoples diaries can be busy, we can re-run sessions to different teams, or for a small fee produce a dedicated training video based on your specific system configuration and content.
Fully featured manuals are available throughout the service for each module, and can be accessed at any time through the system interface. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- If clients require data extraction at the end of their contract, they may request this from their account manager or via the support desk. The team will extract all data from the service, including any uploaded document attachments and provide them to the client in an agreed format via an agreed delivery method. A fee is applicable and is from £3995+VAT (price dependent on volume and complexity of data)
- End-of-contract process
-
At the end of a contract access is automatically revoked from the system.
Clients may request their data, as previously described. All data is held in our systems for a maximum of 12 months following the termination of a contract, unless requested otherwise. This ensures that the data remains available (by request) whilst a replacement service is implemented.
After 12 months, any data or attachments are deleted from our databases.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
A suite of mobile apps are available for Android and iOS, offering offline capabilities that complement the service of the main online system. The apps allow users to take the features of the system, such as task management or auditing to areas where internet connectivity isn't available and still record the necessary details in a familiar interface.
Our online service is built to work on mobile devices through the devices browser; automatically configuring itself for the devices screen size. The full capabilities of the service are available through this method. - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
API's are available for the service to perform specific requirements, such as extracting task lists, or importing user details. access to API's are available upon request.
Typically, our dedicated UK based development team will write an API to meet specific client requirements where they are not meet by our existing library. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
AssessNET has several hundred options that can be used to alter terminology, enable or disable functionality, or present content in different ways. A large number of these changes can be altered by clients through the system interface. Where this isn't possible, our support team are on hand to offer details about the customisable options available and configure them accordingly.
Clients can adjust menu, chart and other interface colours to assist with branding the service to their corporate image. This is in addition to being able to upload a company logo into the system and make it available on all printouts.
Details of all available customisable options will be discussed by an implementation manager during the on-boarding process.
Scaling
- Independence of resources
- Our services are load balanced across multiple servers to ensure resource levels are not impacted.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
A number of service metrics are available from within the service itself, including, but not limited to:
login tracking
record counts
incident statistics
audit statistics
task statistics - Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
Tools are available for core modules that allows the extract of data at scheduled intervals. Extracted data is held within a secure sFTP file store to be retrieved by the client as necessary. Our team control the passwords and access to sFTP file stores.
For larger, full system extracts, clients may request their data, to include uploaded files, via their account manager or our support team. A fee is applicable for data extraction requests. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- Xlsx
- Xls
- Xml
- Json
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Xlsx
- Xls
- Xml
- Json
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
AssessNET has a guaranteed availability of 99.9% per calendar month. Any scheduled maintenance, which may or may not cause downtime, is conducted outside of normal office hours in order to minimise disruption to users.
Our actual service uptime is approximately 99.98% per calendar month, including any scheduled maintenance periods. - Approach to resilience
- This information is available upon request.
- Outage reporting
- Our service does not actively notify of outages. Any planned outages are reported through the inbuilt news feed with an appropriate notice period.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- Identity Federation with clients internal ADFS service
- Access restrictions in management interfaces and support channels
- Access is restricted throughout the system by granular user privileges.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS accredited by BSI
- ISO/IEC 27001 accreditation date
- January 2014
- What the ISO/IEC 27001 doesn’t cover
- Our full service is covered by our accreditation. There are no areas not covered.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We have a suite of in-house policies and procedures which have been audited by BSI in accordance with our ISO27001:2013 accreditation.
Our polices and procedures restrict access to infrastructure and client data to key members of our team. Access is granted on a sliding scale, depending on the level of access required for a particular role.
All employees are aware of our security policies and refresher training takes place at least every 12 months. Our board of directors are responsible for ensuring polices are followed. Our systems have appropriate controls in place to assist them in ensuring they are followed correctly.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All change requests are tracked throughout their lifecycle until they are incorporated into the main systems, where they are then tracked for support purposes.
All developments are tested against the OWASP top 10 and other controls to ensure potential security impacts are eliminated. Developments are tested across multiple browsers to ensure full compatibility. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Undisclosed
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Undisclosed
- Incident management type
- Undisclosed
- Incident management approach
- Undisclosed
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Wellbeing
Fighting climate change
By engaging with colleagues, business partners, and member of the public to report hazards likely to cause environmental incidents and pro-actively responding to these reports. This can significantly reduce environmental incidents and concerns. By proactively managing these hazard reports and providing feedback, stakeholders are aware of the steps taken to reduce and prevent environmental issues or reduce their impact if they do occur.Wellbeing
This module is designed to ensure that colleagues, contractors, business partners etc. are kept safe. By sharing details of potential hazards in the workplace, they can be informed of the hazard and the corrective actions implemented to reduced the risks and eradicate the hazard before it causes an incident or accident.
Pricing
- Price
- £9,995 an instance a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Please contact a member of our team.