Skip to main content

Help us improve the Digital Marketplace - send your feedback

Farthest Gate Limited

Liberator Taxi Licensing

The Liberator Taxi Licensing solution is a market leading module forming part of the Liberator suite of products.Liberator Taxi Licensing can be used independently of other Liberator products. It is very easy to set up, configure and use and offers clients and their customers great efficiencies.

Features

  • Open, modern and secure digital business platform
  • Easy to set up, flexible about how it is used
  • Comprehensive enterprise level content management
  • Secure sharing of digital content
  • Browser based with no specialist plugins required
  • In built system governance for audit and compliance

Benefits

  • Accelerates the throughput and the flow of work
  • Enhance the ability to deal with things first time
  • Fast links for users to relevant data/evidence
  • Responsive to changing circumstances
  • Reduces Risk
  • Enables self service
  • Increases the accuracy of content

Pricing

£1,000 to £2,500 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Mat.Birch@FarthestGate.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 8 2 9 5 9 9 3 3 3 7 3 2 3 4

Contact

Farthest Gate Limited Mat Birch
Telephone: +44(207) 855 9620
Email: Mat.Birch@FarthestGate.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Tested for compatibility with:- Desktop: Chrome 45+, Firefox 51+, MSIE 9+, MS Edge, Safari 10+ Mobile (IOS 9+ or Android Jelly Bean+): Chrome, Safari, Android There are no routine service shutdowns, planned maintenance and upgrades are done on a schedule agreed with clients.
System requirements
  • Internet connectivity
  • Browser (no plugin required)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Clients set their own log priorities and the support desk responds in accordance with pre agreed SLAs.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
Clients provide panel testing of all of our support structures.
Onsite support
Onsite support
Support levels
Support is governed against individual SLAs and these are driven by our clients requirements. Having said this as a rule we offer several levels of support which includes: web support telephone support onsite support remote monitoring Generally all support will be coordinated by a dedicated client manager and we encourage monthly support meetings. Support will normally form part of the licensing or transactional costs but where a request falls outside of the agreement we would charge published daily rates.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Liberator is built to be intuitive and easy to use. The next actions users can make are often defined by the work flows that the clients build or that the legislation demands. However we provide a full range of training functions. We will agree with our clients set training plans and will provide certified training courses directly by our own staff. For London clients we often train in our Kentish Town facilities though are very happy to use clients accommodation. Often our initial training will be to super users in preparation for UAT. Once UAT is completed often the super users will cascade training to their colleagues. We will provide early day floor walking services to help users over the initial trepidation often felt when faced with a new system. This "hand holding" flowing close to initial training and UAT, is often all that clients ever need from us. But we are always available to offer training services if this is required. training is support with manuals/fact sheets and can include online resource like "how to" videos. These are especially helpful for customer facing applications.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
At the termination of the contract we would work with the users to understand the export requirements they have. Usually this involves another supplier and we would work alongside them to export the data in a suitable format to enable the data to be migrated into the new system quickly and efficiently.
End-of-contract process
We can leave the applications running and the clients can continue running them down, with or without support. We can help to manage the transfer of data to a third party system. Or in some cases where there is no propriety data involved the service will just be switched off.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Web pages have been developed to be responsive and therefore automatically adjust to size of a mobile device display.
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
Clients dictate the interfaces that they require and we facilitate and manage them.
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
Clients have panels testing our support structures including interfaces we provide.
API
Yes
What users can and can't do using the API
Users can interact using the REST and SOAP services with our application. This is not exposed on the public internet and customers would require a secure VPN connection before they could access it. We offer API for the loading of tickets, viewing of tickets, paying for tickets and loading of inbound correspondence. Other API points are available but these are low level and we would not encourage use and only then support on time & materials basis.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Generally we will set up branding and client style guides at the start of the contract so that all landing pages are client branded, all public facing pages are branded and built in accordance with the clients style guides. Typically we will also set up things like the workflows to the clients specific rules. We will also set up templates for out going correspondence for both postal and digital communications. Most clients will want us to set up banner branding on other outputted features like reports packs. We also tend to establish the layout of the users landing pages and arrange the dashlets in accordance to client instructions. These can be changed by end users if they are given permission. End users can create the content for their own reports via inbuilt filters or via making queries, depending on their skill levels and the procurement options selected. End users can also completely edit outgoing correspondence using standard word processing type skills. In doing this they can draw from documents and media stored within the system and include these in the outgoing items.

Scaling

Independence of resources
On our internet connection we enable QoS (Quality of Service) to ensure enough bandwidth is available to the end users. We also use segregated infrastructure which means each client has their own dedicated servers running their system. This means that they are not affected by another authority putting strain on the system. Should we see the underlying infrastructure being strained we can easily scale up by either (a) providing additional resources to the VMs running the system or (b) add additional servers in a load balanced solution.

Analytics

Service usage metrics
Yes
Metrics types
Most users will have a landing page that will contain their own performance metrics. these can be measured against a team average very easily, Supervisors have this team view and managers have a higher level view again. The dashboards are mostly dynamic and allow users to drill down into specific details from that first screen. Liberator has several associated reporting tools and this come with pre built standard reports. Reports can be run by authorised users or scheduled to run and be sent to individual email accounts. Bespoke reports can be ordered and there is a reports builder for clients.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Less than once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
There are several export routines within Liberator. These are generally set up to run automatically. Where data is extracted for manipulation and MI purposes this is usually a one click process offering export to a wide range of formats including .csv .xml .txt.
Data export formats
  • CSV
  • Other
Other data export formats
  • Xml
  • Json
  • Txt
  • Xls
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Txt
  • Json
  • Csv
  • Xls
  • Xml

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Our standard availability target is 99%, measured on a calendar month basis and not to include any planned downtime for system maintenance and the likes. Service availability will be defined under specific contract terms but will generally mean that a user under licence can access the system and retrieve information. Where there are local issues that prevent access to the system any failure to be able to meet these conditions will not be deemed to be a breach of the SLA. To monitor the service we will provide clients with our monitoring tool that shows the live status of all server availability.
Approach to resilience
This is dependent on the the clients specific needs but where possible we ensure that we have no single points of failure. The physical servers all run RAID disk arrays and dual teamed network cards. The firewalls are setup in a cluster with one running at each site, this automatically fails over should the primary one experience an issue. Data is replicated between 2 separate sites over a dedicated fibre point to point link.
Outage reporting
We use both internal monitoring tools to monitor CPU, memory and disk space etc as well as external monitoring for our public facing sites. Should any of these monitoring tools detect an issue an email and SMS is sent to a number of people who can resolve the issue. In addition we also have a dashboard available on the internet showing the current status of our systems. These can be easily customised to allow our clients to see only the services that are of interest to them.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Users are added to security groups and all parts of the system are protected from users who are not part of the correct access groups. For example, only users who are a member of a specific security group would be able to reverse a transaction. All user actions and document updates are audited (date/time/userID).
Access restriction testing frequency
Less than once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Centre for Assessment Limited
ISO/IEC 27001 accreditation date
10/10/2018
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We run a robust information security policy that is designed to ensure that all of clients (and so their customers) data is protected at all times. The policy deals not just with the data itself but also extends to security around access to data. This is especially important to us as several of our services have both public facing web pages and involve remote lone workers using mobile devices. We build our system to be in line with legislative standards and to ensure that users have a compliant, safe and secure platform from which to work. The policy is a active part of our core behaviours as we understand that it protects both our clients and ourselves from reputational harm as well as protecting the data itself. It should be noted that for the policy to be effective it needs to dovetail with local client policies and procedures.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We work hard to ensure users are fully aware of changes, that they are trained or have factsheets etc. Generally we will manage and implement most of the initial system configuration, but we will do this this in close partnership with the clients mobilisation team and will rely heavily on them to supply the relevant data sets. Core elements of the service are monitored continually with either monthly KPI reports being used or some clients opting for our live system health checks. Clients IT teams are often involved in the change management process especially so when relating to local security.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We run our own penetration tests regularly using OWASP ZAP to ensure no vulnerabilities exist within our systems. Upon identifying an issue we asses the risk and give the issue a priority. Priorities are assessed by the vulnerability and the number of our clients that it could possibly affect. Information is obtained from a number of sources including Qualys Community and Dell Sonicwall.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We use external penetration tools to help us identify potential compromises. If an issue is identified it is categorised High, Medium or Low. Anything falling into the High category is immediately actioned and a fix sourced immediately. Medium category issues are usually dealt with on a weekly basis. Low category items are resolved on a monthly basis as part of the server maintenance routines.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Users report incidents via a web portal and these are logged directly in our Support Desk software. The software is configured with triggers that recognise common problems, and route them to the most suitable person or team. It contains a Knowledge Base, so that knowledge can be easily shared between team members. We have strict processes for specific events e.g. Priority 1 issues, and these processes are regularly reviewed. Clients can view the progress of issues on the web portal. Incident Reports are run automatically and emailed to a nominated circulation list weekly.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
Public Services Network (PSN)

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

FGL’s work in technology and organisational change contributes to the broader efforts in addressing climate challenges. As our technology continues to evolve, FGL will continue to play a crucial role in creating sustainable solutions for our planet: examples include:

Cloud based delivery - reduces carbon emissions associated with data centers. Cloud ecosystems enable immediate sharing of digital documents across devices and locations.

Our Cloud adoption reduces reliance on hardware, leading to less energy consumption and a smaller environmental impact.

Street Environment - Our suite of products delivers a more efficient and cleaner environment by:
• Charging - Reducing emissions and vehicles numbers
• Bike Hangars - Encouraging adoption of bicycle journeys and ownership
• Street Market Management – supporting the high street – shop local and reduce emissions

Tackling economic inequality

FGL are deeply committed to combating economic inequality and fostering inclusive economic growth in both urban and post-industrial regions. With offices in Euston, London, and Preston, Lancashire, we understand the importance of addressing disparities in economic opportunity and revitalizing communities facing economic and industrial decline.

In Preston, an area marked by economic challenges and post-industrial decline, we recognize the critical need for job creation and skills development. Introducing technical development jobs and investing in training initiatives that empower individuals with the skills needed for success in the digital economy and providing opportunities for local talent is part of our growth strategy.

In fostering collaboration with academic institutions in the region, we aim to contribute to the economic revitalization of Preston and create a more inclusive and prosperous future for its residents.

Similarly, in Euston, London, we are committed to fostering diversity and inclusion within our workforce and supporting underrepresented groups in accessing opportunities in the technology sector. We actively recruit from diverse talent pools and partner with organizations such as Black Women in Technology to ensure that our hiring practices are inclusive and equitable. By leveraging the expertise and talents of individuals from diverse backgrounds, we enrich our team and drive innovation, ultimately contributing to a more vibrant and resilient economy in Euston and beyond.

Furthermore, we believe that economic inequality cannot be addressed in isolation. It requires a holistic approach that encompasses community engagement, skills development, and partnership with government and non-profit organizations. As part of our commitment to social responsibility, we actively engage with local communities, support initiatives that promote entrepreneurship and job creation, and collaborate with stakeholders to drive positive change.

In joining GC14, we are eager to leverage our expertise and resources to support the government's efforts to address economic inequality and promote inclusive economic growth.

Equal opportunity

We are steadfast in our commitment to equal opportunities for all. We believe that diversity and inclusion are fundamental values that drive innovation, foster creativity, and enrich our workplace culture.

Through our ISO-certified processes and policies, we ensure that every individual, regardless of race, gender, age, sexual orientation, disability, or background, has access to opportunities for professional growth and advancement. We actively promote diversity in our recruitment, hiring, and promotion practices, striving to create a workplace that reflects the rich tapestry of society.

We provide comprehensive training and development programs to equip our employees with the skills and knowledge needed to succeed, fostering an environment where everyone can thrive and contribute their unique perspectives and talents.

By embracing equal opportunities and championing diversity and inclusion, we not only adhere to the highest standards of ethical business conduct but also drive sustainable growth and create lasting value for our employees, customers, and communities.

Wellbeing

The FGL suite of products inherently deliver an improved environment which supports stronger communities through our holistic approach to Street Management from roads to pavements, to shops and businesses.

By digitising processes for Local Authorities, we deliver real efficiencies and cost savings at a time when budgets are under enormous pressure.

Delivered in a myriad of ways Liberator can help local authorities with:

• Nuisance and abandoned and untaxed vehicles on the highway
• Air Quality monitoring
• Street Market provision and management
• Residential, Commercial and Bulky Waste Collection
• Environmental Enforcement
• Highways and Street works Licensing
• Parking, Vehicle, and emissions Controls
• Kerbside Management
• Public Space Protection Orders
• Trading Standards

Pricing

Price
£1,000 to £2,500 a user a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Mat.Birch@FarthestGate.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.