Skip to main content

Help us improve the Digital Marketplace - send your feedback

RM Education Ltd

RM Integris

RM Integris is a school Management Information System (MIS) providing web access to information for schools, Trusts, and Local Authorities. Fully compliant with common file transfer standards, supporting the management of school data including attendance, behaviour, assessment, staff, reporting, parental communications, statutory returns and more. Onboarding/offboarding section details exit plan.

Features

  • A single price for all modules - no user limits
  • Includes behaviour, assessment, parental communications, staff, alerts, dinner money, exams
  • Access from anywhere with internet connection - nothing to install
  • Use any device with a web browser including mobile devices
  • Central updates (including census) and backup - out of hours
  • Advanced reporting and graphical analysis as standard
  • Very high service availability on UK hosted infrastructure
  • Simple interface designed to suit all users
  • Experienced migration team, on-site training and UK based support
  • Fully compliant with statutory processes and returns

Benefits

  • Provides secure access to data anytime, anywhere, on any device
  • Removes need for maintenance, licensing and support of expensive servers
  • Data is entered once and used many times across modules
  • Easily create meaningful reports for teachers, parents, governors or Ofsted
  • Supports any preferred approach to in year assessment and tracking
  • Quickly track and assess pupil progress informing teaching and learning
  • Communicate with parents simply and for free
  • Easily provide accurate and robust data for Census submissions
  • Get updates and backups implemented automatically out of school hours
  • Use automatic trend analysis to quickly interrogate school data patterns

Pricing

£980 to £10,312 a licence a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tendersteam@rm.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

8 6 7 1 0 5 6 3 2 7 0 6 8 5 9

Contact

RM Education Ltd RM Education Ltd
Telephone: 08450 700300
Email: tendersteam@rm.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
No
System requirements
  • Internet connection
  • Up to date browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our SLA is 2 hours to first response, 8 working hours to subsequent response. This support is Monday - Friday, 8am-6pm.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Customers may either have direct support from RM or choose to go through our partner network.

Direct RM support - costs are included within the licence fee
Partner support - standard licence costs to the school are reduced by 20% taking into consideration that the school will be required to buy support direct from the partner organisation. 1st line support would be handled by the partner who would escalate, if necessary, any complex issues for investigation and resolution to RM.

We do have the option to provide a technical account manager, the cost of which varies based on level of and number of sites being supported.

We have a number of Application Support engineers who look after the hosted service/infrastructure, they are not customer facing but we have defined escalation route to them.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
All new schools will receive one day of core training in the product along with 4 x 1.5 hour on-line webinars which can be used when required throughout the duration of your contract. The core training can be face-to-face or virtual and will cover all the main functionality within RM Integris to get you started. As you start to adopt other areas of RM Integris you can then make use of your 1.5 hour on-line webinars to help you embed the product and get real value realisation.

The migration of the data into RM Integris happens before training so that the training can be carried out with familiar data.

User manuals are provided alongside the training and can be accessed as PDF files or as hard copies. However, the most detailed information for users is available in the online help at http://help.rmintegris.com/welcome.

We can also offer further personalised training from our experienced professional trainers that can help your team get more out of RM Integris. This type of training can cover specific topics for example:

• Assessment;
• Exams;
• Timetabling;
• Reporting and analytics.

All courses can be customized to fit your needs and budget.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
Microsoft Word
End-of-contract data extraction
Users can extract their data through a series of reports and extracts. For example, a CTF export of all the pupils in the system will provide that output as a CTF file that can be used to import data into the new system.
The CTF file can be augmented with a series of CSV files containing data relating to the pupils or staff members.
End-of-contract process
At the end of the contract, the user can export the data that they require before access is revoked and RM will delete all live data 60 days following the date of termination. At this point, customer data will no longer be recoverable.

If the user would like read only access to the data after the contract ends, they can choose to take out an Archive contract, providing read only access to their data in RM Integris for a year. This archive contract can be renewed annually if it continues to be required.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The mobile interface presents a smaller set of functions in a way that is optimised for touch and smaller screens. This allows easy access to student details, taking attendance, recording behaviour and viewing and taking emergency evacuation registers.
The full desktop version can also be run on a mobile device, if the user wishes to.
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Data can be pulled out of RM Integris on demand using the RM Integris Datashare API. This data includes student information, staff information, behaviour details, attendance data, information on school meals, timetables, groups, and many more data fields.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
As part of the core service we conduct regular capacity planning assessments. These assessments review historic and predicted future load patterns with the intent to ensure the system can meet the predicted peak plus a contingency buffer. System performance is closely monitored to ensure this is achieved by the use of the independent Application Performance Index (Apdex) measure. The target we aim for and achieve is to achieve an Apdex of 0.90 for all customer clicks to be delivered back in 2 seconds.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export data in a number of ways. There are some specific data export functions, for example CTF export, that produce the file in the required format.
As well as this, users can export data from the reports that they run in the system. There are a variety of formats that data can be exported such as Excel, CSV, PDF etc.
Users may create their own CSV exports through out Simple Ad-hoc Report Manager.
Data export formats
  • CSV
  • Other
Other data export formats
  • CTF
  • PDF
Data import formats
  • CSV
  • Other
Other data import formats
  • CTF
  • ATF

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
Other
Other protection within supplier network
All data within the hosted network is protected behind a private virtual network. Within the hosted network, customer data is encrypted at rest for added security, and all backup media is encrypted at the point of being taken.

Availability and resilience

Guaranteed availability
RM Education target an availability SLA of 99.9% within agreed service periods
Approach to resilience
Available on request
Outage reporting
RM Integris has a status page that reports the current status of a number of elements of the RM Integris system, including getting down to the level of particular clusters in the data centre. The status page can be accessed through RM Integris, from the login page or by directly accessing the URL in a browser.

Any current issues can be seen on this page along with what is known about them and what action is being taken, as well as a historic record of planned maintenance or unplanned outages.

The status page allows a user to subscribe to updates and then get sent an email when something changes relating to the area of the system that they have subscribed to. This granularity allows users to just be alerted to the things that they are interested in.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
RM Integris uses a role based permissions system that means users and support staff will only see the data and functionality that has been assigned to them.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Certification Europe
ISO/IEC 27001 accreditation date
Initially 24th October 2007, Certificate issued 3rd November 2019, Valid until 23rd October 2022
What the ISO/IEC 27001 doesn’t cover
Commercial functions
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
RM has the following security policies:
RM Group Security Policy.
Acceptable Usage Policy and Security Guidelines ("AUP").
Backup Policy.
Data Classification and Handling.
Data Protection.
CCTV Policy & Guidelines.
Cryptographic Policy.
Incident Reporting Management & Forensic Readiness.
Legislative Compliance (Security) Policy.
Physical Access.
Protective Monitoring.
Vulnerability Management Policy.

All staff are required to read and acknowledge the AUP on an annual basis, as well as having security clauses in their contracts.

All staff must complete information security training when they join RM and annually thereafter.

Core functions, e.g. IT and HR, are subject to regular internal and external audit.

There is a network of Local Security Officers and the Group Security and Business Continuity Committee monitors compliance with policies.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Hosting configuration details are tracked via asset management systems, and configuration details are stored under source control systems.
All changes to the hosting service are governed by a change management process, and are assessed for their impacts to Confidentiality, Integrity or Availability (CIA) – this is core to our change management process. Every change is logged, reviewed, and approval sought before implementation. During and after execution all change results are logged too. Regular post change analysis is conducted to ensure our change success rate is meeting our internal operation targets.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All public-facing IP addresses are subject to 3rd party vulnerability scanning on a quarterly basis. The results of these scans are reviewed by the development team and patches installed, the timescale of which will be governed by recorded priority.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Regular vulnerability scanning is conducted on all public IP addresses to the hosting service. This scanning has the potential to identify High, Medium and Low severity issues with the exposed service. Our default position is to fix all high severity issues within days of being identified. For all Medium and Low we will conduct a risk assessment triage to determine the appropriate solution and time-to-fix. On occasion, some medium and low severity issues will remain unaddressed as they are either “false-positive” issues, or sometimes accepted business risks at that point in time (which will be reassessed at the next scan).
Incident management type
Supplier-defined controls
Incident management approach
All security incidents are reported on an internal logging system. The log records nature and impact of incident, as well as potential preventative measures. All reported incidents are reviewed by senior management and evaluated at either divisional or Group security forums. Major security incidents would be managed according to a defined major incident management process.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

When Di Booth joined RM to support us looking at our sustainability agenda, she was amazed by how much had already been done. Our New Product Development team were already introducing alternatives to virgin plastics that have a smaller ecological footprint and are bio- or waste-based. We have already reduced our carbon impact by 67% since we stopped our manufacturing business in 2014. In Harrier Park, our purpose-built new site in Nottinghamshire, we are installing solar power which will also result in a further 13% carbon reduction.

After seeing what was already in place, we brought together people in the business who are passionate about the environment to help create an environmental management and sustainable procurement management system that will seek certification to ISO 14001 in 2022. Through this we have developed an ambitious action plan that includes initiatives such as our RM Resources Quality and Procurement Team focussing on packaging on 36,000 products to reduce packaging to an absolute minimum and only use recyclable materials, RM ESI researching how we can make our software lower carbon in use and Software Product Development trialling a new offsetting approach to their own carbon impacts which if successful will be offered to our customers. We are also working with HP on their Take Back Service where HP take back old devices from customer schools and give a credit so that they can be recycled. As a result, in the last year schools have received over £100,000 in credits.

Working with our Executive, we have now also launched a Sustainable Development Governance Panel and Monique Louis, the Managing Director of RM Resources, appointed as Chair. The Panel reviews our progress against plans, objectives and targets, carries out the management review of the management system, develops new strategies and reports to the Executive quarterly.
Equal opportunity

Equal opportunity

Here at RM, our purpose is to enrich the lives of learners worldwide. We are committed to reflecting the diversity of the customers and learners we serve, encouraging and supporting our people to be their true selves, to grow and thrive at work.

We are to creating an inclusive and flexible workplace where all our employees can be themselves and succeed on merit. Without diversity of thought, we cannot continue to innovate and grow.

Earlier this year we completed a D&I audit, to help us understand how diverse and inclusive RM is today and to promote a culture of valuing diversity and inclusion where our employees could bring their whole selves to work. In response to the audit findings, employee volunteers from our D&I Advocates group have created a number of new employee networks to provide peer support and represent marginalised groups in RM by building communities that provide a safe space to be honest about the challenges they face in the workplace. The groups are led by employees who are part of the identity/identities the network represents, and they are used to not only provide peer support to marginalised employees but also to take group ideas, solutions and concerns to improve policies and practices and implement changes to the organisational culture.

Understanding that there are groups in society that are disadvantaged for reasons beyond their control and wanting to do something to address the inequality in our society is an important part of building a diverse and inclusive organisation.

Alongside the Women’s Network other networks are starting to grow, including a LBGTQIA network, the People of the Global Majority Network, and the Neurodiversity Network which is chaired by your bid lead Kevin Brooks.

Pricing

Price
£980 to £10,312 a licence a year
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tendersteam@rm.com. Tell them what format you need. It will help if you say what assistive technology you use.