NEC Interventions Manager
Tool of choice for managing a wide range of service-user interventions across probation, prison, youth justice and non-offender environments. IM supports scheduling, management and reporting for all types of interventions, complex accredited group-work programmes to specialist structured interventions and Unpaid Work.
Features
- Built-in facility for easy integration with your CMS
- Customisable screens to suit your workflow
- Intelligent scheduling for resource and demand management
- Supports variety of intervention types, accredited programmes and structured interventions
- New Unpaid Work & Education Modules
- Secure cloud-hosted, accredited for OFFICIAL-SENSITIVE data
- Accessible via all browsers
- Works on desktop PCs, laptops, tablets and smartphones
- Friendly, responsive support from SC Cleared, ITIL trained staff
Benefits
- You can now manage all intervention types in one place
- Supports individually targeted pathways to reduce recidivism
- Sophisticated scheduling, conflict management improves efficiency, cuts costs
- Intelligent worklow helps practitioners keep on top of their work
- Supports collaboration, work together in partnership
- QA tools enable rigour in delivery of Accredited Programmes
- Single record tracking journey, youth to adult, prison to community
- Built with extensive engagement from users
- GDPR compliant with built in retention policies
Pricing
£515 a unit a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
8 8 3 4 1 6 8 8 4 0 8 5 5 5 9
Contact
NEC SOFTWARE SOLUTIONS UK LIMITED
NEC Frameworks Team
Telephone: 07852 936231
Email: frameworks@necsws.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
-
NEC Interventions Manager can be used on PCs, Laptop or tablets and is tested for compatibility with latest versions on all common browsers but may need to be tested with very old browser versions.
Depending on sensitivity of data you can access using the internet or secure intranet; we will work with your data-owner to set up appropriate controls to protect your data.
Service Desk support is currently 08:00 to 18:00 on working days. Extended support up to 24/7 can be provided on request.
Maintenance is currently undertaken at weekends. Maintenance windows can be agreed with individual customers.
System requirements - System requirements
-
- A PC, laptop or tablet
- Modern Browser
- Data owner/accreditor may decide on added security features
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Incidents can be raised with the Service Desk by email or telephone and will be responded to within 15 minutes during office hours. Normal office hours are 08:00 to 18:00 weekdays (except public holidays), calls or emails received outside of these hours will be responded to within 15 minutes of the start of the next working day. Extended cover up to 24/7 can be arranged if required with the same response times as working days.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Web Chat support is provided by a COTS product that has been extensively tested for assistive technology support and conforms to W3C AA Standards for Accessibility. AT compliance of Web Chat is verified with each IM release and tested with a variety of AT Users including some who are visually impaired.
- Onsite support
- Yes, at extra cost
- Support levels
- NEC Interventions Manager is a Software-as-a-Service product with Service Desk, Hosting, Infrastructure Support all included in the cost. Standard Service Desk support is the same for all customers: Service Desk hours 09:00 to 17:30 weekdays (except public holidays), accessed via email, customer portal (with Web Chat support) or phone, responses within 15 minutes, severity one incidents resolved within 4 hours (see detailed SLA). The NEC Service Desk is staffed with ITIL trained, SC Cleared Analysts, fully trained on the IM application able to resolve the majority of incidents on the first call. Extended Service hours up to 24/7 quoted on request at individual customer rate depending on requirements.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
The standard onboarding process is free and consists of the initial set-up of authentication and loading of reference data. NEC set up the relevant accounts for users to access the system. Each customer will have an account manager who takes care of the onboarding process, ensuring the correct set-up of authentication and reference data. IM has an individual instance of the IM training system for each customer and comes with a free train-the-trainer session.
Additional on-boarding including cascade training, development of bespoke modules or APIs or individual infrastructure will be quoted on an individual basis.
The standard IM offering is a multi-tenanted offering utilised by multiple customers with individual authentication paths to segregate their data. Customers with particularly sensitive data may request an individual bespoke hosting environment (in the cloud hosting environment of their choice) with additional security and defence architecture. MOJ customers already have an accredited multi-tenanted infrastructure in UKCloud Elevated so additional on-boarding infrastructure is quick and cost-effective. - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
- At the end of the contract customers will be provided with their production data using a CESG certified procedure. The data is extracted from the production system and can be provided in a number of formats including SQL Server, CSV and Excel. If the data is sensitive, we will protect it on a CESG approved encrypted drive that will be securely transported to the customer using a process approved by the customer data owner. Once the data has been extracted the cloud data storage will be erased using CESG approved techniques.
- End-of-contract process
- NEC Interventions Manager is a cloud hosted Software-as-a-Service Product and is charged on a usage basis plus a basic monthly subscription. At the start of the contract each customer is provided with a URL to access IM and their users are set up with valid authentication to access the system. At the end of the contract, after the customer data has been returned, access will be removed and the customer’s databases (including the authentication) will be erased using CESG approved techniques. There is no additional cost to provision of the data extract or termination.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
NEC Interventions Manager is built using modern application frameworks which allow an easy transition between desktop to mobile devices. The NEC development team are working on additional rendering benefits to improve usability for smaller devices. Device-aware components automatically switch appearance and behaviour to best suit the device, providing a better experience for touch screens. Finger taps and gestures arrive as normal mouse events, so your event handlers work. Context menus/hovers trigger via touch-and-hold, and drag and drop via finger slides.
As a cloud application, IM is compatible with many browsers on tablets, allowing use without need to install an app. - Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- NEC's applications are built to use modern, lightweight REST/JSON web service interfaces; to best enable open and extensible architectures that can integrate between systems, data mining and application extensions.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- NEC’s utilises modern frameworks and technologies which deliver the basic set of requirements for semantic and accessible UI code. We perform assistive technology testing using ZoomText, JAWS and Dragon Naturally Speaking and ensure we are in compliance of W3C AA Standards for Accessibility. With each new release of NEC Interventions Manager, we engage with AT users to get feedback and respond to any concerns identified. NEC Interventions Manager, has been delivered across the Probation Estate and tested with a variety of AT Users including some who are visually impaired.
- API
- Yes
- What users can and can't do using the API
- NEC Interventions Manager has an easily configurable API for interfacing with Case Management Systems. The standard interface (currently implemented for the National Probation Service) automatically transmits all new intervention requirements from the CMS to IM. In IM, the referrals are accepted and enrolled and the schedule of intervention sessions is sent back o the CMS for inclusion in the diary. As sessions are attended the relevant information (attendance/ non-attendance and other option information) is fed back to the CMS. Enforcement is configurable and can happen in either system. The standard API operates between any SOAP / RESTful interface on the CMS and is quick to implement at On-Boarding. Changes to the interface can be requested and new interfaces developed to interface with other applications (Enterprise Resource Planning, HR and other systems) are bespoke development developed prior to on-boarding at additional cost.
- API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Because NEC Interventions Manager has been developed using a micro-services architecture it is easy to customise. The IM Roadmap is reviewed at bi-annual User Group Meetings and the user community agrees on priorities. Representatives from the User Group also participate in Agile development of the releases ensuring that each enhancement benefits from practitioner input. The Bi-annual releases are included in the SaaS license subscription but individual customers can also request bespoke development. Customer funded bespoke modules are held in individual micro-services only executed for that customer; these enhancements are developed with the customer using the agile methodology, the IP is retained by the customer and source and object code are owned by the customer enabling the customer to exploit the same service in other applications. This is useful for non-CMS APIs, standard services such as internal reference data and also useful for innovative interventions developed by a customer that the customer wants to keep confidential.
Scaling
- Independence of resources
-
Performance on all customer systems is monitored with real-time dashboard displaying utilisation of processor, memory and disk. Automatic alerting provides warning or the need to augment resources and new virtualized resources can be implemented before any impact occurs. Network analysis tools display all internal traffic within applications so any constraints building on any system node are anticipated and managed.
Customers with particularly sensitive data may opt to operate on the public cloud; regardless of whether running on dedicated or shared infrastructure resources are maintained well above thresholds and monitored to ensure better than SLA performance.
Analytics
- Service usage metrics
- Yes
- Metrics types
- NEC Interventions Manager provides detailed usage metrics. The Software-as-a-Service charge is calculated on a combination of a fixed fee per business unit and a variable fee based on usage and customers are provided with the number of user logged-on each day, the number of unique users logged-on (as opposed to someone who takes a break and comes back into the system), number of clients / offenders, the number of open interventions and a history of he completed interventions. Service Desk statistics on incident management and SLA performance are also available to users and to the User Group.
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
-
The data protection within the AWS environment is configured in line with best practice for themselves and in line with guidance from NSCS.
All data encryption and tokenization is enabled on all resources within AWS to ensure consistency and Compliance. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- NEC Interventions Manager is designed to provide easy access to data within and outside the application. The microservices architecture facilitates interfacing through APIs including a standardised CMS interface which passes all attendance and progress data back to the CMS and the potential for customised interfaces with other customer applications. Standard reporting provides comprehensive dashboards and KPI monitoring and users are able to build their own reports and data extracts. Search screens are customisable and the data from any search can be exported to Excel.
- Data export formats
-
- CSV
- Other
- Other data export formats
- MP4
- Data import formats
-
- CSV
- Other
- Other data import formats
- MP4
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
NEC Interventions Manager SLA is 99.9% availability during core hours (08:00hrs to 18:00hrs weekdays and Saturday mornings to 14:00hrs) except public holidays) and 99% outside core hours with the exception of agreed maintenance windows. Maintenance windows for application enhancements and system patching and security updates are agreed with the User Group (currently Wednesday night after 22:00hrs and Saturday night from 18:00hrs to Sunday at 12:00 midday). Individual customers on dedicated cloud infrastructure can agree to different maintenance windows to suit their operations. Refunds operate on the following scale:
Availability achieved falls below 99.9% in core hours - 10% of license fee,
if it falls below 95% in core hours - 15% of license fee
and anything below 95% in core hour - 20% of license fee. - Approach to resilience
- NEC Interventions Manager is designed for resilience. Defence-in-depth architecture requires single purposed servers so for security purposes web-front-end-servers are separated from applications servers, database servers and authentication servers with firewall controls on access between. Each function has redundant servers so for example if one web-front-end server should fail user access automatically fails over to another working server. Monitoring ensures that any outage is immediately recognised and dealt with quickly so single component failures are short and do not impact the service. We also provide a range of cost-effective site disaster recover scenarios to cover the unlikely event of a full site disaster. More detailed resilience design information is available to customers on request. In addition to the standard high-resilience offering, there are a number of individually tailored, cost-effective options available.
- Outage reporting
- The NEC Service Desk maintains a list of key stakeholders for each Interventions Manager customer. In the unlikely event of an unplanned outage, emails are sent to those stakeholders notifying them of the outage. Periodically, they are given updates as to Incident Management progress, estimated time of resumption and eventually, root-cause analysis. Additionally, the URL is redirected to a screen informing users of the outage and offering an anticipated recovery time. Planned maintenance outages are agreed with the User Group or with individual customers (running on dedicated cloud infrastructure) and posted in advance on the logon splash screen.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- NEC Interventions Manager is supported by the NEC Service Desk supported by second-line Live Services support and applications support. Access to the live environment is strictly controlled to SC cleared staff on the principle of least privilege. Access is issued by security management to specific individuals for specific tasks for specific periods and controlled through rigorous authentication policies. A full audit trail of all interventions is maintained for forensic purposes.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 07/06/2021; valid until June 2024. Certificate IS 598449.
- What the ISO/IEC 27001 doesn’t cover
- The NEC Information Security Management System (ISMS) is registered to ISO 27001:2013 and therefore audited by BSI at least annually. All NEC staff are required to comply with the ISMS.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials Plus
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Cyber Essentials Plus
- Information security policies and processes
- NEC has a number of interconnected governance frameworks in place which control how the company operates and provides its services to customers. The most relevant of these is certification to ISO/IEC27001:2301, the international standard for Information Security Management Systems. Acceptance into Service Checklist There are several other Technical server builds, client builds, vulnerability management, firewall controls baselined documents. All policies are covered by NEC review procedure. Policies for critical assets are reviewed six monthly and others are reviewed at least annually.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- NEC is ISO27001 accredited and follows rigorous Configuration and Change Management processes. All proposed Change Requests (CRs) to Interventions manager are reviewed and must be approved in advance by the Product Management, Infrastructure Management and Information Security. The CR specifies all Configurations Items (CIs) that will be impacted by the change and, once the change has been completed, tested and implemented the ISMS Manager verifies that the Configuration Management Database(CMDB) is updated. The ITIL Service Desk tracks all incidents against CIs giving a lifetime history of that item and the ability to analyse CIs that are the root-cause of incidents.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- NEC has operated for twenty years in the management of sensitive data; we are ISO27001 and Cyber Security accredited, all staff are SC cleared and Interventions Manager is accredited to hold Official-Sensitive data. Vulnerability Management is an on-going process led by CESG-certified security consultants; Risk Management and Accreditation Document Set (RMADS) are maintained, full Health check by external certified check consultants are conducted annually and internal software in the SIEM security set monitors all components for up-to-date patching and virus definitions. Enterprise-class security toolset is maintained by suppliers with latest threat information.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
NEC Interventions Manager is protected by the Secure Operations Centre. The application has in-build, compliant logging and all application and system logs have been reviewed and any that indicate a potential threat are alerted.
The SOC team monitors alerts displayed on consoles in the secure area. Potential threats have been analysed with clear escalation paths to second-level support and proceduralised responses to specific threats.
The SOC team also monitors trends of user activity through reporting looking for suspicious or anomalous behaviours. All messages, application and infrastructure are retained in the system log (with integrity protection) for forensic purposes. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- The NEC Service Desk has an excellent reputation for support of front-line users. All staff are fully trained in Interventions Manager, able to resolve any training issues and, wherever possible, to find a workaround to any issue. They have access to a Near-Live-Environment (NLE) to enable them to replicate and diagnose any issues. All incidents are managed using the ITIL best-practice methodology and all staff are fully trained. Incidents can be raised by phone, email or on the Help-Desk Portal and are managed to strict service levels (available on request). Incident Management reporting is made available to User Group members.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
NEC has committed to being Net Zero by 2030. We project our carbon emissions will reduce by 50% from our baseline by 2026.
We have implemented a multitude of initiatives to support this:
• Appointing an Environmental Manager and Environmental Champions.
• Successfully obtaining certification for and implementing ISO14001:2015 Environmental Management System (EMS).
• Developing a Carbon Reduction Plan, which is published on our website and an Environmental Strategy.
• Maintaining an Environmental Aspect and Impact Register (down to site level) through which to capture elements of our operating practices which could negatively impact the environment.
• Working with government accredited consultants to understand environmental impact and using outputs to inform future improvement activities.
• Collaborative activities to influence customers, supply chain partners and employees.
Specific initiatives applicable to our contract delivery approach include:
• Energy used on the contract will be from green energy sources.
Business travel will reduce where possible through utilisation of technology such as:
• Video conferencing.
• Sharing documents.
• Conference call facilities.
• Working from home/flexible working arrangements.
• Approval controls in place for commercial flights.
• Use of environmentally friendly data centres.
Our Environmental Policy objectives, relevant to the contract include:
• Meeting all relevant legal requirements and monitoring our compliance.
• Minimising our environmental impacts for the life cycle (including disposal) of work equipment and other physical assets under our control.
• Demonstrating efficient use of energy, water, and other natural resources.
• Maximising opportunities to minimise our waste by reusing or recycling waste, where practical.
• Ensuring our supply chain is aware of our environmental policy and our commitment to ensuring its effective implementation.
• Increasing environmental awareness and commitment amongst colleagues through training and briefings.
Continuing to identify opportunities to improve our environmental performance through clear objectives, plans and targets. - Covid-19 recovery
-
Covid-19 recovery
Since the emergence of Covid-19 as a global health crisis, we have supported our customers and the local communities they serve to adapt to the challenges posed by the pandemic. As a supplier of software and services to the public sector, this has included rapid development and deployment of software solutions to enable the efficient and effective delivery of new government schemes and changes in legislation, such as provision of Test and Trace Support Payments and new hospitality sector licensing requirements.
Initiatives we have implemented to support the policy outcomes include:
• Increasing our pre-pandemic workforce numbers through recruitment of an additional 250 UK based roles, many of whom were unemployed following redundancy from other sectors such as hospitality.
• Re-training and redeploying temporarily displaced colleagues rather than imposing redundancies or taking advantage of the furlough scheme.
• Commitment to investing over £400,000 in training and apprenticeships.
• Working collaboratively with customers to introduce new ways of working.
• Delivering community based social value through donations in kind to voluntary sector organisations impacted by the pandemic.
As part of our response to the pandemic we invested in and introduced several initiatives and workplace adaptations to protect employee health and safety, including:
• Introducing wider use of remote and flexible working, including making additional allowances for those caring for young children.
• Enhancing office safety, including installing sanitising stations, hygiene screens and digital thermometers.
• Increasing the frequency of colleague communications, with a focus on provision of mental health support and reducing the risks of isolation/loneliness.
• Providing all employees with free access to additional specialist resources, including 24x7 counselling and mental health services. - Tackling economic inequality
-
Tackling economic inequality
We recognise the expertise, innovation and value that can be gained from having a diverse supply chain and providing all suppliers with a fair and equal opportunity to become suppliers to us and our customers. We operate openly and transparently to enable this collaboration with third-party suppliers including large enterprises, sub-contractors, SMEs, VCSEs, mutuals and social enterprise organisations.
Additionally, we are committed to nurturing new and existing talent and creating a sustainable learning and development culture, equipping our staff with the appropriate skills, knowledge and processes so the company continues to deliver innovative, industry leading solutions.
Processes and practices we have adopted to tackle economic inequality include:
• Using outcome-based specifications and co-design methods to encourage suppliers, communities, users and third sector organisations to collaborate and propose solutions based upon end user requirements, rather than being prescriptive.
• Advertising supply chain opportunities openly and always operating transparently.
• Including modules covering anti-bribery and corruption, whistleblowing, equality and diversity in our all-colleague compulsory Annual Compliance Training.
• Having policies and operating practices that support effective supply chain relationships through fair selection and responsible management. For example, only flowing down appropriate contract terms.
• Paying at least 95% of all invoices within agreed terms and agreeing to reduced payment terms for SMEs and subcontractors.
• Never deducting sums from payments as a charge for remaining on our supplier list.
• Investing in new jobs and training opportunities through an active Apprenticeship scheme.
• Creating opportunities for career progression and investing in reward and recognition initiatives that support employee retention.
• Following the foundational principles of the Good Work Plan in respect of employee satisfaction, fair pay, well-being and safety, career progression, voice, and autonomy.
• Having appropriate controls in place to mitigate cyber security risks. - Equal opportunity
-
Equal opportunity
We want to be an employer of choice for people of all backgrounds, regardless of sexuality, disability, nationality, race, gender or religion. We are committed to ensuring workers either directly employed or employed within our supply chains are treated fairly, humanely, and equitably.
To encourage a diverse and varied workforce our approach to equal opportunity includes:
• Ensuring job adverts reach a diverse audience, including utilising job sites which encourage interest from disadvantaged and Black, Asian and Minority Ethnic (BAME) groups.
• Inclusive and accessible recruitment practices, supporting candidates with disabilities through provision of supportive technology and/or changes to working practices.
• Collecting, analysing and senior reporting of equality and diversity data obtained during recruitment activities.
• Making appointments on the grounds of selecting the most suitable candidate for the post.
• Gender-neutral role definitions.
• Ensuring policies and employee communications promote respect and equality for all.
Other activities supporting equal opportunity within the workforce include:
• Tackling gender pay gap, through annual audits. Women now comprise over a third of our leadership team, including our Chief Executive.
• Compliance with Modern Slavery Act 2015 and 9 core principles of Ethical Trading Initiative Base Code.
• Ensuring effective controls are in place to mitigate and manage risks of exploitation within the supply chain, including supplier questionnaires and evidence requirements.
• Provision of appropriate channels for colleagues to have an effective voice, such as our Employee Steering Group.
• Investment in workforce development and training, including an active Apprenticeship and Graduate Recruitment programme.
• No use of zero hours contracts or fire and rehire practices.
• Being a Real Living Wage Employer.
• Flexible working practices.
• Transparent and structured promotion, pay and reward processes.
• Senior level sponsorship at board level supporting and promoting equal opportunity beyond basic statutory requirements. - Wellbeing
-
Wellbeing
Physical Fitness and Mental Stability is one of our sustainable development goals.
Our approach to supporting good health and wellbeing which will be applicable to the contract workforce includes:
• Providing employees with free and confidential access to specialist resources 24x7, including counselling and mental health services through our Employee Assistance Programme.
• Providing private healthcare cover for employees. Cover includes Doctor at Hand service to provide employees with fast and convenient access to advice, assistance and medical treatment, GP appointments anytime and anywhere.
• Maintaining compliance with the six standards of the Mental Health at Work commitment and a dedicated module to promote health and wellbeing as part of our all-colleague compulsory compliance training.
• Accommodating workplace adjustments, such as supportive technology for those with a disability or health condition.
• Encouraging good physical health by providing discounted corporate gym membership over 3,300 participating gyms through our employee GymFlex scheme.
We incorporate national health and wellbeing campaigns within our communications calendar, raising employee awareness and signpost to useful support pathways. Our 2022/23 calendar include raising awareness of the following nationally recognised campaigns:
• Stress Awareness Day.
• Mental Health Awareness week.
• World Menopause Day.
• National Eye Health week.
• World Diabetes Day.
• Stress Awareness Month.
• Suicide Prevention Day.
• Men's Health week.
Within one of our acquired businesses, we have Mental Health First Aiders who have trained to spot signs of mental ill health and provide early support for colleagues who may be developing a mental health issue.
Supporting employee health and wellbeing is underpinned by clear action plans for improvement and several Human Resources policies, such as our:
• Health and Safety Policy
• Alcohol, Drugs & Solvent Abuse Policy
• Menopause Policy
• Absence Policy
• Flexible Working Policy
• Gender Reassignment Policy.
Pricing
- Price
- £515 a unit a month
- Discount for educational organisations
- Yes
- Free trial available
- No