RM Integris
RM Integris is a school Management Information System (MIS) providing web access to information for schools, Trusts, and Local Authorities. Fully compliant with common file transfer standards, supporting the management of school data including attendance, behaviour, assessment, staff, reporting, parental communications, statutory returns and more. Onboarding/offboarding section details exit plan.
Features
- A single price for all modules - no user limits
- Includes behaviour, assessment, parental communications, staff, alerts, dinner money, exams
- Access from anywhere with internet connection - nothing to install
- Use any device with a web browser including mobile devices
- Central updates (including census) and backup - out of hours
- Advanced reporting and graphical analysis as standard
- Very high service availability on UK hosted infrastructure
- Simple interface designed to suit all users
- Experienced migration team, on-site training and UK based support
- Fully compliant with statutory processes and returns
Benefits
- Provides secure access to data anytime, anywhere, on any device
- Removes need for maintenance, licensing and support of expensive servers
- Data is entered once and used many times across modules
- Easily create meaningful reports for teachers, parents, governors or Ofsted
- Supports any preferred approach to in year assessment and tracking
- Quickly track and assess pupil progress informing teaching and learning
- Communicate with parents simply and for free
- Easily provide accurate and robust data for Census submissions
- Get updates and backups implemented automatically out of school hours
- Use automatic trend analysis to quickly interrogate school data patterns
Pricing
£980 to £10,312 a licence a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
8 6 7 1 0 5 6 3 2 7 0 6 8 5 9
Contact
RM Education Ltd
RM Education Ltd
Telephone: 08450 700300
Email: tendersteam@rm.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
-
- Internet connection
- Up to date browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Our SLA is 2 hours to first response, 8 working hours to subsequent response. This support is Monday - Friday, 8am-6pm.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Customers may either have direct support from RM or choose to go through our partner network.
Direct RM support - costs are included within the licence fee
Partner support - standard licence costs to the school are reduced by 20% taking into consideration that the school will be required to buy support direct from the partner organisation. 1st line support would be handled by the partner who would escalate, if necessary, any complex issues for investigation and resolution to RM.
We do have the option to provide a technical account manager, the cost of which varies based on level of and number of sites being supported.
We have a number of Application Support engineers who look after the hosted service/infrastructure, they are not customer facing but we have defined escalation route to them. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
All new schools will receive one day of core training in the product along with 4 x 1.5 hour on-line webinars which can be used when required throughout the duration of your contract. The core training can be face-to-face or virtual and will cover all the main functionality within RM Integris to get you started. As you start to adopt other areas of RM Integris you can then make use of your 1.5 hour on-line webinars to help you embed the product and get real value realisation.
The migration of the data into RM Integris happens before training so that the training can be carried out with familiar data.
User manuals are provided alongside the training and can be accessed as PDF files or as hard copies. However, the most detailed information for users is available in the online help at http://help.rmintegris.com/welcome.
We can also offer further personalised training from our experienced professional trainers that can help your team get more out of RM Integris. This type of training can cover specific topics for example:
• Assessment;
• Exams;
• Timetabling;
• Reporting and analytics.
All courses can be customized to fit your needs and budget. - Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Microsoft Word
- End-of-contract data extraction
-
Users can extract their data through a series of reports and extracts. For example, a CTF export of all the pupils in the system will provide that output as a CTF file that can be used to import data into the new system.
The CTF file can be augmented with a series of CSV files containing data relating to the pupils or staff members. - End-of-contract process
-
At the end of the contract, the user can export the data that they require before access is revoked and RM will delete all live data 60 days following the date of termination. At this point, customer data will no longer be recoverable.
If the user would like read only access to the data after the contract ends, they can choose to take out an Archive contract, providing read only access to their data in RM Integris for a year. This archive contract can be renewed annually if it continues to be required.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The mobile interface presents a smaller set of functions in a way that is optimised for touch and smaller screens. This allows easy access to student details, taking attendance, recording behaviour and viewing and taking emergency evacuation registers.
The full desktop version can also be run on a mobile device, if the user wishes to. - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Data can be pulled out of RM Integris on demand using the RM Integris Datashare API. This data includes student information, staff information, behaviour details, attendance data, information on school meals, timetables, groups, and many more data fields.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- As part of the core service we conduct regular capacity planning assessments. These assessments review historic and predicted future load patterns with the intent to ensure the system can meet the predicted peak plus a contingency buffer. System performance is closely monitored to ensure this is achieved by the use of the independent Application Performance Index (Apdex) measure. The target we aim for and achieve is to achieve an Apdex of 0.90 for all customer clicks to be delivered back in 2 seconds.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Users can export data in a number of ways. There are some specific data export functions, for example CTF export, that produce the file in the required format.
As well as this, users can export data from the reports that they run in the system. There are a variety of formats that data can be exported such as Excel, CSV, PDF etc.
Users may create their own CSV exports through out Simple Ad-hoc Report Manager. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- CTF
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- CTF
- ATF
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- Other
- Other protection within supplier network
- All data within the hosted network is protected behind a private virtual network. Within the hosted network, customer data is encrypted at rest for added security, and all backup media is encrypted at the point of being taken.
Availability and resilience
- Guaranteed availability
- RM Education target an availability SLA of 99.9% within agreed service periods
- Approach to resilience
- Available on request
- Outage reporting
-
RM Integris has a status page that reports the current status of a number of elements of the RM Integris system, including getting down to the level of particular clusters in the data centre. The status page can be accessed through RM Integris, from the login page or by directly accessing the URL in a browser.
Any current issues can be seen on this page along with what is known about them and what action is being taken, as well as a historic record of planned maintenance or unplanned outages.
The status page allows a user to subscribe to updates and then get sent an email when something changes relating to the area of the system that they have subscribed to. This granularity allows users to just be alerted to the things that they are interested in.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- RM Integris uses a role based permissions system that means users and support staff will only see the data and functionality that has been assigned to them.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Certification Europe
- ISO/IEC 27001 accreditation date
- Initially 24th October 2007, Certificate issued 3rd November 2019, Valid until 23rd October 2022
- What the ISO/IEC 27001 doesn’t cover
- Commercial functions
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
RM has the following security policies:
RM Group Security Policy.
Acceptable Usage Policy and Security Guidelines ("AUP").
Backup Policy.
Data Classification and Handling.
Data Protection.
CCTV Policy & Guidelines.
Cryptographic Policy.
Incident Reporting Management & Forensic Readiness.
Legislative Compliance (Security) Policy.
Physical Access.
Protective Monitoring.
Vulnerability Management Policy.
All staff are required to read and acknowledge the AUP on an annual basis, as well as having security clauses in their contracts.
All staff must complete information security training when they join RM and annually thereafter.
Core functions, e.g. IT and HR, are subject to regular internal and external audit.
There is a network of Local Security Officers and the Group Security and Business Continuity Committee monitors compliance with policies.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Hosting configuration details are tracked via asset management systems, and configuration details are stored under source control systems.
All changes to the hosting service are governed by a change management process, and are assessed for their impacts to Confidentiality, Integrity or Availability (CIA) – this is core to our change management process. Every change is logged, reviewed, and approval sought before implementation. During and after execution all change results are logged too. Regular post change analysis is conducted to ensure our change success rate is meeting our internal operation targets. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- All public-facing IP addresses are subject to 3rd party vulnerability scanning on a quarterly basis. The results of these scans are reviewed by the development team and patches installed, the timescale of which will be governed by recorded priority.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Regular vulnerability scanning is conducted on all public IP addresses to the hosting service. This scanning has the potential to identify High, Medium and Low severity issues with the exposed service. Our default position is to fix all high severity issues within days of being identified. For all Medium and Low we will conduct a risk assessment triage to determine the appropriate solution and time-to-fix. On occasion, some medium and low severity issues will remain unaddressed as they are either “false-positive” issues, or sometimes accepted business risks at that point in time (which will be reassessed at the next scan).
- Incident management type
- Supplier-defined controls
- Incident management approach
- All security incidents are reported on an internal logging system. The log records nature and impact of incident, as well as potential preventative measures. All reported incidents are reviewed by senior management and evaluated at either divisional or Group security forums. Major security incidents would be managed according to a defined major incident management process.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
When Di Booth joined RM to support us looking at our sustainability agenda, she was amazed by how much had already been done. Our New Product Development team were already introducing alternatives to virgin plastics that have a smaller ecological footprint and are bio- or waste-based. We have already reduced our carbon impact by 67% since we stopped our manufacturing business in 2014. In Harrier Park, our purpose-built new site in Nottinghamshire, we are installing solar power which will also result in a further 13% carbon reduction.
After seeing what was already in place, we brought together people in the business who are passionate about the environment to help create an environmental management and sustainable procurement management system that will seek certification to ISO 14001 in 2022. Through this we have developed an ambitious action plan that includes initiatives such as our RM Resources Quality and Procurement Team focussing on packaging on 36,000 products to reduce packaging to an absolute minimum and only use recyclable materials, RM ESI researching how we can make our software lower carbon in use and Software Product Development trialling a new offsetting approach to their own carbon impacts which if successful will be offered to our customers. We are also working with HP on their Take Back Service where HP take back old devices from customer schools and give a credit so that they can be recycled. As a result, in the last year schools have received over £100,000 in credits.
Working with our Executive, we have now also launched a Sustainable Development Governance Panel and Monique Louis, the Managing Director of RM Resources, appointed as Chair. The Panel reviews our progress against plans, objectives and targets, carries out the management review of the management system, develops new strategies and reports to the Executive quarterly. - Equal opportunity
-
Equal opportunity
Here at RM, our purpose is to enrich the lives of learners worldwide. We are committed to reflecting the diversity of the customers and learners we serve, encouraging and supporting our people to be their true selves, to grow and thrive at work.
We are to creating an inclusive and flexible workplace where all our employees can be themselves and succeed on merit. Without diversity of thought, we cannot continue to innovate and grow.
Earlier this year we completed a D&I audit, to help us understand how diverse and inclusive RM is today and to promote a culture of valuing diversity and inclusion where our employees could bring their whole selves to work. In response to the audit findings, employee volunteers from our D&I Advocates group have created a number of new employee networks to provide peer support and represent marginalised groups in RM by building communities that provide a safe space to be honest about the challenges they face in the workplace. The groups are led by employees who are part of the identity/identities the network represents, and they are used to not only provide peer support to marginalised employees but also to take group ideas, solutions and concerns to improve policies and practices and implement changes to the organisational culture.
Understanding that there are groups in society that are disadvantaged for reasons beyond their control and wanting to do something to address the inequality in our society is an important part of building a diverse and inclusive organisation.
Alongside the Women’s Network other networks are starting to grow, including a LBGTQIA network, the People of the Global Majority Network, and the Neurodiversity Network which is chaired by your bid lead Kevin Brooks.
Pricing
- Price
- £980 to £10,312 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- No