Enterprise Workforce Management solution for a highly transient workforce copy
A web-based platform allowing the capture of workforce management information on direct and indirect employees in a highly transient workforce across multiple locations and contractors, guaranteed single profile, Beginning from the online induction, through to the mobile capture of training and records across multiple locations in high risk industries.
Features
- Central competency database
- Mobile Briefing Manager
- Fatigue Management
- Skills Checker
- Competency Passport
- Mobile onsite competency site checker
- Real-time reporting on captured data
- Custom reporting
- On-boarding and online induction
- Forms and snagging
Benefits
- Ensure all staff are compliant and competent across all sites
- Capture talks and briefings onsite via mobile devices without paperwork
- Mitigate fatigue risk onsite by automated monitoring and reporting
- Ensure workers have the right skills onsite in real time
- Ensuring worker competencies across multiple sites and organisations
- Check competencies without paperwork onsite via mobile technology
- Quick and easy real-time visual data displays across all sites
- Monitor and create tailored reports which can be scheduled
- Remote induction process without paperwork for efficiency and traceability
- Digitise forms and manage snags without paperwork
Pricing
£30 a user a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 2 4 2 2 0 4 5 7 7 0 5 8 5 0
Contact
BIOSITE SYSTEMS LIMITED
Kamran Ali
Telephone: 07786630155
Email: kamran.ali@biositesystems.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- It is a custom solution built around client requirements.
- System requirements
-
- Internet connectivity
- Suitable internet browser listed in the upcoming answers
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
4 hour response Monday - Friday 7am- 6pm, custom options are available subject to client requirements. Responses are handled via a ticketing system and sent to the support team.
Dedicated 24 7 is available as a custom option as required. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- This is not something that has been deployed, it is something that we are working to deploy.
- Web chat accessibility testing
- We are currently in the process of this testing.
- Onsite support
- Onsite support
- Support levels
-
Our standard support is model is Monday to Friday 7am - 6pm. We also provide a dedicated Key Account Manager, Project Manager and the option of a dedicated engineer if you are using our on-premise services. We offer options of up to 24 hour support 7 days a week. However any such requirements are deemed custom.
Costs are subject to size and complexity of the set up and number of users on the platform. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We have a complete implementation service dependent on user requirements. We provide onsite consultancy and training dependent on the complexity of the requirements. We can also provide online training and user guides for our solution.
The implementation guide documents the client specific requirements to ensure that additional users and access is managed in a congruent manner across all sites as defined by the client with permission levels, GDPR requirements and sensitivity levels of the information are a key part of our 60 page implementation guide. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- There are a number of options available; this can be as simple as a csv file. We can also provide data via our API to a third party system throughout the contract.
- End-of-contract process
- We can include the extraction of the data and format as part of the contract, it depends on the scope of the solution we are providing. We always tailor the solution in response to the specific needs of the customer.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile devices render to make the user experience as easy as possible. Our clients can use a mobile application that enables the capture of data and allows the quick and easy check of an individual's competencies and training information. This is specifically designed to deliver information that is typically key to our client base as well as capture information on linear and closed sites. The desktop would typically be used to make changes to the format and data capture requirements of the software rather than the mobile application. Dedicated mobile view for every screen. Offline capability on the app.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- An open API and web socket.
- Accessibility standards
- None or don’t know
- Description of accessibility
-
Biosite is committed to providing solutions that are available to the widest possible audience. In achieving this, Biosite endeavours to conform to the WIA's Web Content Accessibility Guidelines 2.0 at the elevated AA-level.
Further to our focus on accessibility, Biosite produces platforms with usability at the core of its design processes. Employing practices such as wireframing, prototyping and user testing, and with usability and accessibility integral throughout the development cycle, Biosite is able to deliver software that is well thought out, intuitive and considerate to every type of user, regardless of role or ability. - Accessibility testing
- This is something we are currently working on.
- API
- Yes
- What users can and can't do using the API
- We have a rest API from which users can create, read, update, and delete information on the system, based on permissions given by the customer. We also provide a web socket API for real-time notification for change events. Modifying the system configuration is not possible through the API as it is used to access data.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The platform is highly customisable with the ability to capture any field of information required, we can set this up as part of the implementation process or enable the client to set up themselves. Each field can have a different level of sensitivity to control access levels to the data as well as different deletion periods that can be applied to each field. Each field can also have dependent fields, so for example if you asked "Do you have any medical issues", if the answer was "no", you would move on to the next question. If the answer was "yes" then you could be given another list of questions to answer. This also has a significant impact on the user journey streamlining the process as much as possible. Only users with the right permission level will be able to customise the software portal and this is verified as part of the implementation process.
Scaling
- Independence of resources
- We monitor the capacity of our systems and have the ability to allocate more resources if necessary. We are currently in the process of looking at auto scaling. Determining the initial capacity requirements is part of the implementation process to ensure the system has the required resources from the beginning of the project.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Number of users,
accounts created
Total no of users on the system
NO if tickets raised
Time of resolution
Monthly SLA reporting target vs actual. - Reporting types
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data is exportable via our portal reporting tool which allows permitted users to extract data to pdf, excel and csv. The reporting tool allows you to correlate the data and export in your preferred method.
- Data export formats
- CSV
- Data import formats
- Other
- Other data import formats
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
99% availability.
SLA are subject to client requirements.
Specific terms on repayment and compensation relating to performance against service levels can be detailed within each customer agreement.
To date we have not fallen below our agreed standard SLA uptime of 99% - Approach to resilience
- This information is available on request.
- Outage reporting
- Our service reports outages via Email alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Only predefined users as defined by the implementation process can access the solution. Users can only be added to the platform via a predefined mechanism subject to the client specific needs and processes. Again this is a consultative process and we work with our clients to ensure they get the optimum workflows and security restrictions.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS
- ISO/IEC 27001 accreditation date
- 29/01/2019
- What the ISO/IEC 27001 doesn’t cover
-
Our scope only covers our head office operations.
We only exclude the following controls from Annex A:
14.2.7 Outsourced development: we do not outsource development.
17.1.3 Review information security continuity: we expect information security controls to continue operating unmodified even under adverse conditions. CIA of relevant systems and controls is covered within the risk assessment. - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Cyber Essentials
- Cyber Essentials Plus
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Available on request subject to NDA.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All software development is subject to design code review and QA verification as well as tracked using source control. Security aspects are considered at design and code review stages and where appropriate verified by QA. Only verified builds are deployed to customer systems. System configuration is also held in change control and changed are automatically deployed by an infrastructure management platform.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
We monitor public vulnerability databases for relevant advisories. Where necessary we would take action to upgrade or mitigate any issues or vulnerabilities.
We automatically all security patches weekly. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our systems monitor for unauthorised activity and automatically ban IP addresses when a high volume is detected.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
We have predefined 5 stage processes in place.
1 - Containment - Take any action necessary to stop an ongoing incident.
2 - Investigation - Gather evidence
3 - Reporting - Notify relevant people and organisations with the relevant information
4 - Analysis - root cause investigation
5 - Response - implementation of new controls or measures to stop the incident from reoccurring.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Equal opportunity
Fighting climate change
We recycle and re-use equipment only using local providers where possible. We target savings in efficiency in terms of consumption of resource in order to produce equipment more economically.Covid-19 recovery
We provided solutions at the peak of Covid 19 for construction sites which allowed construction sites to operate safety use automated hand sanitiser and facial recognition technology which was developed specifically in response to covid 19.Equal opportunity
We are an equal opportunity provider and can share our equal opportunity policies as required.
Pricing
- Price
- £30 a user a year
- Discount for educational organisations
- No
- Free trial available
- No