Data Analytics
We provide a fully managed data collection and analysis service via our cloud-based solutions covering attendance/attainment monitoring, ePEPs and analytics dashboards to assist Local Authorities in improving outcomes for vulnerable cohorts. Analytics visualises the collected data, providing actionable insights to influence changes in practice and identify where interventions are needed.
Features
- Easy to interpret visualisations of complex data
- Analytical, Strategic, and Operational Dashboards
- Interactive and filterable
- Use to engage Senior Management, Social Care and Ofsted
- Drill down to individual child level data
- Identifies areas for early intervention and support
- Access on a 24/7 basis
- Cloud-based platform providing secure, accessible, and appropriate access
- Download the data in CSV, XLSX, PDF, and PNG format
- Updated Daily
Benefits
- Graphical analysis of key Performance Indicators
- Interactive visualisations of Attendance, Attainment and ePEP data
- Trend analysis over weeks, months, and Academic Years
- Downloadable reports, images, and PDFs
- Drill down on cohorts by gender, ethnicity, age, or geography
- Visual representation of key personal education plan (PEP) data
- Statutory timescale compliance for PEPs
- Data Analytics on Exclusions, Special Educational Needs (SEN), Pupil Premium
- Identify key areas to narrowing the attainment gap
- Supporting commissioning decisions
Pricing
£7,500 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
7 7 5 5 8 4 4 4 8 2 8 6 5 1 4
Contact
Welfare Call (LAC) Limited
Andrew Henderson
Telephone: 01226 716333
Email: bidmanagement@welfarecall.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Attendance, Attainment and Electronic Personal Education Plan (ePEP)
- Cloud deployment model
- Private cloud
- Service constraints
- Not applicable
- System requirements
-
- Internet access
- Connection through a current supported internet browser
- Individual corporate email address
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Priority 1: The entire system is completely inaccessible - response within two to four business hours.
Priority 2: Operation of the system is severely degraded, or major components are not operational and work cannot reasonably continue - response to within four business hours.
Priority 3: Certain non-essential features of the system are impaired while most major components remain functional. - response within 12 business hours.
Priority 4: Change requests or issues that are cosmetic and/or have little or no impact on the normal operation of the Services. - response within 24 business hours. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- We have the same level of support applied to all our customers. A dedicated team of support specialists is available as first line support. As a hosted provision our technical team take full responsibility for the configuration, maintenance, updates and support of the cloud service. Welfare Call will ensure the service/software is up and running through a thorough implementation programme. Reviews then take place at least every 6 months to ensure the service/software is fulfilling the necessary requirements of the client. There are a number of different support methods which are provided e.g. online training, user documentation, training videos, webinars, phone support etc and during the implementation programme onsite support may be provided. Any onsite support which is needed over and above this may incur an additional charge.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Onsite training, online training, user documentation, training videos, webinars, user workbooks are included in the start up process as well as access to a dedicated analytics product specialist support team. Dashboards are released on a predetermined schedule to ensure the end users take up is as efficient as possible.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data is provided to the client by encrypted data transfer, or data is destroyed in line with GDPR and the contractual obligations as laid down in the contract with the client.
- End-of-contract process
- Contract exit options form part of each contract definition and are discussed with the client both at the start and end of the contract to ensure that all statutory obligations, valid at the time, can be accounted for. Depending on the level of additional work required there may be additional charges made to cover the effort of meeting the client's requirements.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Extranet: A cloud-based customer portal allows the user to manage their account details, change security questions, review their access logs and use the built in secure messaging service to request support, provide data updates or access the help materials.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- The interface is tested with assistive technology for visual impairments (reversed colours, high contrast, grey-scale etc) as well as screen readers. The development team have a suite of tools to identify accessibility issues as code is produced.
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- We automatically monitor performance of our dedicated servers multiple times every hour including measuring typical page load times and comparing against a known baseline. The service performance/capacity can be increased as required.
Analytics
- Service usage metrics
- Yes
- Metrics types
- User sessions, dashboard activity, dashboard performance,
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Within the system on-screen options are available to allow the end user to download individual visualisations or the dashboards entirely and extract the underlying data
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- PNG
- XLSX
- Data import formats
-
- CSV
- Other
- Other data import formats
- Other formats are managed by our admin team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Secure email
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Contracts are agreed taking into account client agent access times which typically extend well beyond the standard working day. Service affecting maintenance is scheduled for the early hours of the morning to minimise disruption from planned work. Service affecting issues in core business hours are prioritised and addressed immediately.
- Approach to resilience
-
The service is run on a virtual platform to be independent of the underlying hardware. The service is configured for with N+1 redundancy: dual redundant internet connections, UPS, mirrored storage arrays and dual compute provision.
Daily backups taken and copies are stored offsite. - Outage reporting
- Performance and service availability are measured in the data centre, from our own internal monitoring solution and from independent 3rd parties. If performance drops below key trigger levels or if the service is not available emails are automatically sent to key senior staff and an event is logged. A dashboard is displayed in all technical offices showing trends and alerts. A dashboard is also available for clients to view availability.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
- We use a multi factor authentication process. Clients can make this mandatory for all agents with access to their data. Options include one time partial password, partial secret phrase, and one time code using Google Authenticator
- Access restrictions in management interfaces and support channels
-
Within the site there are four levels of access restrictions:
1. User Types, limiting the basic users interface.
2. Authority limiting to what services are available
3. Individual Permissions overriding a specific user to elements.
4. Authority settings limiting the authorities options - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Other
- Description of management access authentication
- Management and maintenance of the service data is only possible via a specific VPN tunnel with public key authentication. Management of the underlying infrastructure is protected by username and password.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials accreditation
- Information security policies and processes
- Information security policies and processes are continually reviewed and updated to deal with emerging threats, changing legislation and to account for the development of new and existing services. Our focus is currently on our move towards ISO 27001 accreditation. Development is in line with, but not limited to, the following legislation: The Data Protection Act (2018)/GDPR, The Computer Misuse Act (1990), Freedom of Information Act 2000, Business Continuity Management and ISO 27001 standard. If you have specific questions relating to aspects of our policies please contact us with details of your request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Following ITIL guidelines a ticket is logged for every change request to record all actions and decisions taken. Designs follow a version control process allowing a review of the full history. Development is carried out in a separate environment and undergoes testing and peer review prior to being made live. NCSC and other guidelines are are referenced to ensure configuration changes follow best practice standards.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Code is developed within a secure framework. 3rd party CREST approved annual penetration test is carried out with monthly updates. Annual Cyber Essentials assessment is completed.
A subscriptions to the National Vulnerabilities Database creates actionable tickets for developers to check potential risks.
Automated software update checkers alert technicians to security updates. NIDS and HIDS solutions are used to identify issues.
Continual development and deployment practices allows a quick response to any issue found. Infrastructure patches/updates are applied within 14 days. Security issues can be actioned in less than an hour. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Potential compromises are identified through our network and host Intrusion Detection services, Anti-Virus software and alerts configured in the firewalls.
If compromises are identified proactive action is taken to remedy the issue immediately followed by a risk assessment - Incident management type
- Supplier-defined controls
- Incident management approach
-
We have pre-defined processes for common events defined in our procedures. For everything else we have a set of guidelines to follow.
Users report incidents either via phone, email or secure messaging. Incidents can also be reported by our automatic monitoring services that will send alerts by email, by raising a ticket and by displaying an alert on the monitoring screens in our technical offices.
Incident reports are provided by secure email to a nominated contact agreed with the client.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Please contact us directly for further information. - Covid-19 recovery
-
Covid-19 recovery
During the Covid-19 outbreak we communicated directly with our customers daily and issued regular business continuity updates by email and also provided a status update via our website.
We continued to monitor service users via an adapted model to ensure business continuity.
Further details can be provided upon request. - Tackling economic inequality
-
Tackling economic inequality
Please contact us directly for further information. - Equal opportunity
-
Equal opportunity
Our vision is for the company to be a successful, caring and welcoming place for staff and service users to receive care and advice. We feel we achieve this by creating a supportive and inclusive environment where our staff can reach their full potential and care is provided in partnership with service users, without prejudice and discrimination. We are committed to a culture where respect and understanding is fostered and the diversity of people's backgrounds and circumstances will be positively valued. Our aim is to achieve equality of care experience by removing any potential discrimination in the way that our staff and service users are cared and treated by us, including: • people with disabilities • people of different sexual orientations • transgendered and transsexual people • people of different races • people on the grounds of their sex • people of faith and of no faith • people in relation to their age • people in relation to their social class or medical condition • people who work part-time • people who are married or in a civil partnership • women who are pregnant, have recently given birth or are breastfeeding To ensure this, we maintain a wide range of policies covering all aspects Equality, these include: • Equality and Diversity Policy • Ethical Recruitment Policy • Safeguarding Policy We also provide literature and information in a variety of languages, if required and our services are accessible to staff and service users with disabilities. Please contact us for further details. - Wellbeing
-
Wellbeing
Please contact us directly for further information.
Pricing
- Price
- £7,500 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No