Meeting Quality Service
Provide a simple capability to capture meeting satisfaction information and to use that to map relationship quality and other business metrics.
Features
- Capture feedback from meetings
- Rate satisfaction and confidence
- Feedback on Governance elements
- Capture actions and risks
- Capture information around 1 to ones
- Receive personal feedback on meeting performance
- See the service document for more
- Understand team personality profiles
Benefits
- Spot relationship problems around any recurring meetings
- Compare confidence and satisfaction from team to customer and leadership
- Track metrics over time and fix trend
- Compare confidence metrics to hard calculated metrics
- Track mood and emotions where physical contact is low
- Customer partner and supplier relationship tracking in key initiatives
- Use AI to offer predictions on wellbeing and success
- Improve meeting and governance outcomes through better relationships
Pricing
£120 to £200 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 7 5 6 7 3 7 4 4 8 4 3 8 0 8
Contact
Deep Team
David Dunning
Telephone: 07767803540
Email: info@deepteam.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Not Applicable
- System requirements
- Need a Web Browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 24 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
In addition to remote technical support, support levels are determined by the requirement.
Simple (i.e. super user training);
Adoption (i.e. Simple plus user training plus adoption assistance);
Full change (i.e. Adoption plus current state review, vision and strategy, benefit realisation).
Price based on number of days required to implement.
See related Meeting Services - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Onsite / offsite training, online training and documentation can be provided, in addition to standard service offerings for:
Simple support (training etc)
Full support (adoption)
Change Services (problem to solution and sustainment).
There is a full service set explained in the services document. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- A report and CSV download is provided on a per user basis - it is the user's data (this is because downloading full data for all users violates GDPR).
- End-of-contract process
-
A report and CSV download is provided on a per user basis.
Further needs can be addressed as required (chargeable).
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
-
The API is for administrators to access information through.
The requirements for usage of the API is determined on a case by case basis, and administrators need to be certified (trained) to access the facility. - API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Only the Software Vendor (Meeting Quality) / Service Provider can customise the service.
Scaling
- Independence of resources
-
Good system design and many years experience.
There are internal tools which allow the service provider to spot variances and remedy before users see consequences.
Analytics
- Service usage metrics
- Yes
- Metrics types
- This depends on the service required, but at a minimum each meeting has the number of people invited, responded and absent tracked, plus the results of the standard analysis across all meetings.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- MeetingQuality
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
-
The application with its one-time password is intrinsically secure. A Distributed Denial of Service attack has been specifically addressed with automated reporting/throttling of responses to ensure application integrity. Unusual and suspicious activities are logged and, in most cases and result in a silent disconnect. Logs are automatically sent every day to responsible individuals.
Only two ports are open. Access to data at rest is only available through an admin port and the MeetingQuality port that requires a one time password. Access to the admin port is only available through the incident/release management process which strictly controls access to online machines. - Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- A report and CSV download is provided on a per user basis.
- Data export formats
- CSV
- Data import formats
- Other
- Other data import formats
- No imports are necessary
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- None
- Approach to resilience
-
Information available on request.
All patches from Microsoft are automatically loaded as soon as they become available.
No special category data as defined by GDPR is stored in MeetingQuality machines. - Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
-
Administrator access is only provided to trained users/support partners.
Support design is part of service set up. We recommend adding incident management to a customer help desk.
Ultimately, access to full technical support is open to all users, but this is rarely accessed. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
There are several roles defined within the organisation responsible for security, consisting of:
1. Role 1: Governance, risk and compliance
2. Role 2: Assessments and audits
3. Role 3: Third party risk management
4. Role 4: Incident response
5. Role 5: Business continuity management
6. Role 6: Penetration testing and phishing
7. Role 7: Network security
8. Role 8: Application security
9. Role 9: Data Protection Officer - Information security policies and processes
-
There are several roles defined within the organisation responsible for security, consisting of:
1. Role 1: Governance, risk and compliance
2. Role 2: Assessments and audits
3. Role 3: Third party risk management
4. Role 4: Incident response
5. Role 5: Business continuity management
6. Role 6: Penetration testing and phishing
7. Role 7: Network security
8. Role 8: Application security
9. Role 9: Data Protection Officer
The policies are assured through mentoring, training reporting and audit against:
1. MeetingQuality BYOD and Acceptable Use Policy
2. MeetingQuality Data Classification Policy
3. MeetingQuality Data Protection Policy
4. MeetingQuality SDLC
5. MeetingQuality Security Incident Response Policy
6. MeetingQuality Security Organization
7. MeetingQuality Server Security Policy
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- During Periodic security testing and assurance activities, change and configuration management processes are followed by all personnel as defined in the MeetingQuality Security Organization document and, Role 2: Assessments and audits. These are audited annually.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
See “MeetingQuality Security Organization”. Role 7&8: Network/Application security. These capabilities are audited annually.
Network vulnerabilities are assessed during the annual pen test using NMAP/Wireshark. All servers are automatically updated to the latest Microsoft O/S update.
Software vulnerabilities:
1. Design review with external consultant.
2. Library/component review. Only standard Microsoft Visual Studio c#, Apple xcode or Android Studio development environments used. (A maximum of one version point behind the latest).
3. Static code analysis. Release Management Process demands there must be 0 warnings before migrating software to production. Visual Studio is used for static code analysis.
4. OWASP Top 10 Review. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Information security monitoring and threat detection:
Management of information security monitoring and threat detection is split on functional lines (described in our MeetingQuality Security Organization. Role 7: Network security and Role 8: Application security are specifically tasked with monitoring the network/application respectively. This capability is audited annually.
There is no automated network tools, monitoring is via log reviews.
A Distributed Denial of Service attack has been specifically addressed with automated reporting and throttling of responses to ensure application integrity.
Unusual/suspicious activities are logged and, in most cases, result in silent disconnect. Logs are automatically sent daily to responsible individuals. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Incident management roles are defined in our MeetingQuality Security Organization: Role 4: Incident response.
Access to user support is typically internal within an organisation (via Meeting Organiser then Helpdesk) escalated to a Consulting Partner in a service level (TBC for each implementation). These are tracked with a customers incident management capability.
Sometimes (rarely) Technical Support may be required. It is available through MeetingQuality by email: support@meetingquality.com. Incident reports are provided by email (escalations are very rare)
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our Interconnected Well-Being: Nurturing Nature and Ourselves The well-being of humanity is intricately linked to the health of our natural systems. Achieving well-being depends on the vitality of these ecosystems. At Deepteam, we recognize this interdependence and actively work toward a harmonious balance. Here’s how we approach it: 1. Understanding Nature’s Well-Being: We delve into the essence of nature—what sustains it and allows it to thrive. By understanding its well-being and capacity, we gain insights that guide our decisions. 2. Empathy and Compassion: Building empathy and compassion for nature is essential. Recognizing our dependence on natural systems encourages responsible actions that protect and enhance them. 3. Nature as a Stakeholder: Nature has a voice—one that deserves representation in our decision-making processes. We ensure that its interests are considered alongside other stakeholders’. 4. Remote Work for Sustainability: Our Deepteam consultants are encouraged to work remotely whenever possible. This reduces unnecessary travel, minimizing our ecological footprint. 5. Eco-Friendly Travel: When travel is necessary, we promote eco-friendly options. Consultants are encouraged to use public transport or share rides, reducing emissions from single-occupant journeys. By nurturing nature, we nurture ourselves. Our commitment to well-being extends beyond human boundaries, embracing the interconnectedness of all life.Tackling economic inequality
At Deepteam, we are committed to addressing economic inequality through core values, policies, and initiatives. Here’s how: 1. Equal Treatment and Fair Chances: We believe that all people should be treated equally, with everyone having chances to succeed. Their opinions matter, and we actively promote an inclusive environment where diverse voices are heard. 2. Empowering Lives: Our team is driven by a powerful desire to improve the lives of others. We recognize that openness and collaboration lead to greater support and positive impact. 3. Long-Term Wellbeing: We acknowledge that the long-term wellbeing of both people and the planet is at risk. To address this, we embrace transformative approaches and prioritize accelerated learning. 4. Supporting Small Organizations: Deepteam collaborates with freelance associates, actively supporting small organizations. By fostering economic growth and business creation, we contribute to a more equitable landscape. 5. Inclusive Hiring Practices: We focus on recruiting a diverse workforce, reaching out to underrepresented and economically disadvantaged groups. Our internships and training programs provide opportunities for candidates who demonstrate potential beyond traditional qualifications. 6. Fair Compensation: Regular reviews ensure equitable pay for our employees. Comprehensive benefits, including health insurance, educational allowances, and retirement plans, support their families. 7. Professional Development: All employees have access to training and development opportunities. Career advancement is based on merit, promoting growth across all company levels. 8. Flexible Work Arrangements: We offer flexible working conditions to help employees balance work and personal responsibilities. 9. Inclusive Workplace Culture: Our culture values diversity and inclusion. Regular workshops on unconscious bias and diversity, along with open forums, address challenges related to inequality. 10. Employee Representation and Voice: o We actively involve employees in decision-making through surveys and focus groups, ensuring diverse perspectives shape our organization.Equal opportunity
Deepteam’s Commitment to Equal Opportunity and Social Responsibility At Deepteam, we are dedicated to fostering equal opportunity and social responsibility within our organization. This reflects our core values and extends to the services we provide: 1. Inclusive Approach to Recruitment: We believe in an open and accessible hiring process. Our recruitment efforts actively seek out diverse talent from various backgrounds. Additionally, we offer internships and create pathways for individuals who may not have traditional qualifications. 2. Equitable Compensation Practices: Transparency is key to our compensation practices. We regularly conduct salary audits to ensure fairness across all employee levels. Our benefits package is designed to include comprehensive health care coverage, educational allowances, and flexible retirement planning. 3. Professional Development Opportunities: We provide equal access to training and advancement opportunities. Our development programs are tailored to help employees at all levels enhance their skills and progress in their careers. 4. Social Responsibility through BIG CIC: Our support of the BIG CIC (a social enterprise) demonstrates our commitment to sharing knowledge for the public good. By actively participating in initiatives that benefit society, we contribute to positive change. 5. Tackling Modern Slavery: Deepteam reiterates its commitment to combating modern slavery. ALL Directors share responsibility for anti-slavery initiatives, ensuring that our practices align with ethical standards. 6. Trusted Relationships: Deepteam operates with a network of directors and associates who have known each other for many years. We do not engage with agents to provide staff; instead, we work exclusively with individuals we trust. As a result, the risk of supporting slavery or human trafficking knowingly or accidentally is minimal. Our dedication to equal opportunity and social responsibility drives our mission and shapes our organizational culture. We continue to evolve and adapt, always striving for positive impact.Wellbeing
Promoting Well-Being: Our Commitment at Deepteam At Deepteam, we recognize that well-being is the ultimate human objective. It represents the pinnacle of value generation, and creating well-being for others forms the foundation of a meaningful life. Here’s how we actively ensure well-being across our organization:
1. Employee Well-Being Programs: We prioritize comprehensive health benefits for our employees. This includes mental health support and wellness programs that promote both physical and mental well-being. Regular health assessments and access to counselling services help our team maintain a healthy work-life balance.
2. Flexible Work Arrangements: We understand the diverse needs of our staff. As a result, we offer flexible working options such as remote work, flexible hours, and part-time schedules. This approach allows employees to manage personal commitments alongside their professional responsibilities, reducing stress and enhancing job satisfaction.
3. Professional Development Opportunities: Our commitment to continuous professional growth extends to our employees. We provide training, mentorship, and career advancement opportunities. By investing in our staff’s development, we ensure they feel valued and equipped to achieve their professional goals, contributing to overall job satisfaction and well-being.
4. Safe and Inclusive Workplace: Maintaining a safe, respectful, and inclusive workplace is non-negotiable. Our policies against discrimination and harassment are strictly enforced. Regular training on diversity and inclusion further reinforces our commitment to fostering a positive work environment.
We firmly believe that prioritizing well-being benefits not only our employees but also our clients and partners. It underpins our operational philosophy and service delivery, ensuring a holistic approach to success.
Pricing
- Price
- £120 to £200 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- The whole service is included.