Bantham Technologies Digital Data Capture
Bantham Technologies provide a robust remote digital data capture solution utilising digital pen, mobile and tablet devices, designed to streamline the collection, distribution and data integration. Tablet and mobile data collections forms provide a fully paperless solution.
Features
- Remote digital data capture utilising mobile, tablet and digital pen
- Auditable, time, date, location and ID validation
- Fully secure with end-to-end encryption with tamper-evident seals
- Compliant with GDPR data regulation requirement
- Significant water and energy savings giving a positive environmental impact
- Removes the need to post or hand deliver important documents
- Maximise productivity by reducing travel time and administration load
- Improves customer service and dispute resolution utilising photographic evidence
- Digital pen, tablet and smartphone data capture
- Cloud based near real time data integrated into enterprise systems
Benefits
- Easily accessible Software as a Service (SaaS) product
- Provides user access and user management based on job function
- Modify completed data for compliance and set authorisation levels
- Form creation tool for clients to design individual forms
- Apps to support iOS, Android and Windows devices
- Manage users authentication and device management
- Complete, edit and park forms also with offline form submission
- Capture signatures, GPS location and photos into input forms
- Integrate workflow using avaiable API(s) from and to inkwrx
- Frequent updates to service for optimised user experience
Pricing
£20 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 8 1 7 7 8 0 2 4 3 1 3 5 4 2
Contact
Bantham Technologies Limited
Edward Belgeonne
Telephone: 07836696969
Email: edward@banthamtechnologies.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- Regular planned maintenance albeit out of operating hours: Web browser, Operating System (PC, Phone and Tablet) contraints are in however we build and provide services and applications on all major vendors. For our pen technology, the Bluetooth stack may need updating on the mobile device. Enhanced printer requirements are needed.
- System requirements
-
- Access to an internet browser (IE/Chrome)
- Devices and Operating System to run data collection apps
- Compatible Printers for our pen technology
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Questions will be responded to within an hour and actioned within the timeframes specified in our SLA.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- The Support Team is available Monday to Thursday 09:00 to 17:30 and Friday 08:30 to 16:30. Cost of support is included in the monthly/annual subscription charges and is exclusive of public holidays.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Training will be provided on a train the trainer basis giving you a Bantham champion within your business who can assist your team in the first instance. An initial two-hour training will be provided remotely (at no cost and at an hourly rate thereafter) to give your champion the capability to manage the Bantham platform, build forms and utilise the apps. On site training can be provided at an extra cost.
- Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- End-of-contract data extraction
- Clients will have access to their data for up to thirty days, after which all data and accounts will be deleted.
- End-of-contract process
- One month's notice to be given on either annual or monthly contracts, all data will be accessible for 30 days post end of contract. Correspondence to be e-mailed to info@banthamtechnologies.com
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The functionality and layout between desktop and mobile services are identical in terms of look and functionality.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Web based platform allowing access to all client specific data, viewing, managing, analysing and designing and embedding workflow.
- Accessibility standards
- None or don’t know
- Description of accessibility
- N/A.
- Accessibility testing
- N/A.
- API
- Yes
- What users can and can't do using the API
- Users are able to prepopulate predefined data from their internal application (embedding data on the form created): Ability to dynamically assign drop down lists for easy insertion into a live form. Pull completed data rather than pushing. The users cannot modify or make any changes to the API available.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The platform can be re-branded to the individual company. Administrators can design their own forms and workflow within the platform and add and remove users.
Scaling
- Independence of resources
- Throughout our application and deployment lifecycle we use capacity planning metrics from an environment, application and cloud service perspective.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Monthly report showing number of forms sent, number of active licences and economic and environmental benefits of utilising Bantham.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- INKWRX Digital Data Capture Solution
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Encryption of all physical media
- Other
- Other data at rest protection approach
- All databases and end points are encrypted using industry standard protocols and techniques.
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data can be delivered in PDF, XML and CSV format. INKWRX can be integrated into various CRM systems to receive data.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- We protect data at rest and in transit
Availability and resilience
- Guaranteed availability
- Bantham Technologies have invested significantly in a fully resilient and robust hosting capability for the Bantham Platform, through Microsoft Azure, which optimises the Service Availability and minimises the risk of failure and downtime. Bantham Technologies will review any recompense incidences on a case by case basis.
- Approach to resilience
- Available upon request.
- Outage reporting
- Email and dashboard alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Other
- Other user authentication
- Retrieved upon request
- Access restrictions in management interfaces and support channels
- Retrieved upon request
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Other
- Description of management access authentication
- Retrieved upon request
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Information Commissioners Office registered
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We are working towards ISO 27001
- Information security policies and processes
- Internal reviews, workshops, external and internal compliance checks through Software Development and operating environment.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All change requests wiithin our SDLC are documented and signed and before progressing to the production stage. Before production deployment a review takes place to ensure the effectivness of change to the exisiting service models are meet along with seucrity assessments to ensure compliance for in code and environment.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We patch systems every 30 days based on the operating environments we work within and use. (subject ot the importance we patch sooner. Internally we review the threat levels to ensure we minimise and or control the impact.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Retrieved upon request
- Incident management type
- Supplier-defined controls
- Incident management approach
- Retrieved upon request
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- NHS Network (N3)
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Our solution removes the need for paper based practises, saving over 50 million litres of water and 26 tonnes of CO2 alone from paper production annually.
Pricing
- Price
- £20 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day free trial with access to Bantham platform and apps, demo forms included for testing of data collection and workflow.