Skip to main content

Help us improve the Digital Marketplace - send your feedback

Juniper Education Services Limited

Juniper MIS

Juniper MIS for Primary, Secondary, and All-Through schools introduces a reimagined MIS solution. It guarantees high level software and data connectivity. Streamlining administrative functions and improving communication, it refines operations, enabling better decision-making. This optimisation facilitates student achievement and alleviates staff burdens by simplifying processes.

Features

  • Comprehensive student record keeping
  • Attendance, Consents, Meals, Behaviour, Safeguarding and Schedules
  • Multi-channel communication (Email, SMS, Notifications)
  • DfE statutory returns and compliance
  • Cloud native, remote access from anywhere
  • Robust security and privacy controls; UK based data centres
  • Import or export your data at any time
  • Statistical modelling-based insights
  • Committed to data democratisation and open standards
  • Wonde API compatibility

Benefits

  • Efficient and accurate completion of everyday tasks in record time
  • Lightweight, uncluttered, and easy to use interface supporting adoption
  • Lightning fast. Access from anywhere, using any device
  • Cost-effective solution for compliance and statutory returns
  • Quality insights support data driven decision making at all levels
  • Enhanced communication with the right information at the right time
  • Distribute and delegate tasks with ease
  • Quality controls help maintain accurate and well organised data sets
  • Works brilliantly with the Juniper Education ecosystem of solutions
  • Works with your other favourite EdTech partners via. Wonde API

Pricing

£1,200 a licence a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@junipereducation.org. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 1 2 5 9 8 2 5 7 0 1 4 7 5 5

Contact

Juniper Education Services Limited Aimee Hardy
Telephone: 03452008600
Email: tenders@junipereducation.org

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Juniper Management Information System (MIS) seamlessly integrates with all Juniper products and services, offering a unified platform for comprehensive educational management. It harmonises data flow, enabling streamlined operations and enhanced decision-making. Whether it's HR, finance, or communication tools, Juniper MIS maximises synergy across the entire Juniper ecosystem.
Cloud deployment model
Public cloud
Service constraints
Juniper's maintenance is scheduled, restricted to essential instances, to minimise disruptions. Typically conducted overnight and during non-term periods, it ensures operations remain uninterrupted, prioritising our users convenience and system reliability.
System requirements
The service works with the following: Chrome, Edge & Safari

User support

Email or online ticketing support
Email or online ticketing
Support response times
Service Level Agreements (SLAs) vary from 1 hour to 4 weeks, contingent upon query priority, ranging from High Priority to Low. P1 issues, necessitating immediate attention, demand a swift resolution within an hour, ensuring critical operations aren't disrupted. In contrast, lower priority concerns categorised as Low may allow for a more lenient timeframe of up to 4 weeks for resolution, accommodating less urgent matters without compromising service quality. This tiered approach enables efficient resource allocation and timely response according to the criticality of each query, optimising operational efficiency and customer satisfaction.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We use a 3rd party web chat provider
Onsite support
Yes, at extra cost
Support levels
Included as standard, we offer comprehensive support levels tailored to diverse customer needs. Our primary tier, 1st line support, attends to common issues and basic troubleshooting queries. Accessible via our Online Knowledge Base, users find instant solutions. Additionally, personalised assistance is available through phone or ticketing system for 'how-to' questions. For intricate issues, our 2nd line support, accessed through 1st line escalation, handles advanced technical queries with deeper expertise and thorough investigation. This ensures efficient problem resolution, upholding high customer satisfaction. Our tiered system guarantees prompt and accurate assistance, delivering the appropriate level of expertise. Pricing varies based on support level and customisation needs. Optionally, customers can opt for a technical account manager or cloud support engineer for personalised, proactive support, available at an additional cost tailored to the scope and complexity of the services required.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
When joining this Juniper service, new users are assigned an on-boarding specialist to project manage the process and ensure that they get everything they need to start using the service successfully. This process is carefully curated to ensure that all the right tasks are done at all the right times including data migration, data validation, training and implementation.

This process uses a hybrid approach to support any school joining the service whilst also ensuring that any individual needs are met. This includes comprehensive documentation, training sessions and associated learning. Juniper don’t just want users to know how to use the service, we want users to know why they are using the service and how to realise the greatest benefit against their particular needs.

Once started and live with the service, Account Managers will continue to ensure that new users have what they need to fully realise benefits.
Service documentation
Yes
Documentation formats
  • HTML
  • Other
Other documentation formats
  • Webinar
  • Video
End-of-contract data extraction
Upon termination of the contract, users are granted access to their data through a database backup, facilitating seamless migration to alternative platforms. This database backup ensures the preservation and transfer of all pertinent information, enabling users to maintain continuity in their operations. Through this process, users retain control over their data and can seamlessly transition to a new service provider or internal systems without loss or disruption. Additionally, our support team stands ready to assist throughout the data extraction process, ensuring a smooth and efficient transition. We prioritise the security and integrity of our users' data, providing comprehensive solutions for data extraction to uphold their trust and facilitate a hassle-free departure from our service.
End-of-contract process
At the end of the contract, users are required to provide sufficient notice in accordance with the contract terms to terminate the service. Upon giving notice, users enter a transition period leading up to the contract end date, during which they can extract their data from the service. This ensures a smooth transition and allows users to retain control over their information as they prepare to discontinue the service.

At contract end date, the user will lose access to the service.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
All web based products from Juniper Education are built using responsive design principals. The only difference between the web versions and mobile versions is adaptation of the presentation to a smaller screen size. All features and capabilities are therefore the same across platforms.
Service interface
Yes
User support accessibility
WCAG 2.1 A
Description of service interface
Juniper MIS prides itself on its swift and user-friendly interface. With a minimalist approach, it offers a streamlined experience with limited menu items and standardised screens. This uniformity accelerates navigation, empowering staff to swiftly access necessary functions. Designed specifically for school operations, it prioritises efficiency by excluding extraneous sections or features found in other Juniper products. As a precision tool, Juniper MIS focuses solely on running day-to-day school processes, ensuring a clean and uncluttered interface tailored to meet the unique needs of educational institutions.
Accessibility standards
None or don’t know
Description of accessibility
Accessibility is paramount to us at Juniper Education. Adhering to stringent accessibility guidelines, we strive to maximise inclusivity for all users. Through continuous utilisation of tools and technologies, we relentlessly enhance the user experience, ensuring accessibility remains at the forefront of our service development. Whether through intuitive navigation or compatibility with assistive technologies, we are dedicated to providing an accessible platform for all individuals. This ongoing commitment reflects our belief in equal access to information and services, fostering a more inclusive and equitable user experience for everyone.
Accessibility testing
We diligently test our interfaces with users of assistive technology. Leveraging screen reader metadata and semantic markup, our interfaces are crafted to seamlessly integrate with popular accessibility tools. Currently, our testing processes involve manual assessments, allowing us to gather invaluable feedback from users with diverse accessibility needs. This hands-on approach enables us to identify potential barriers and refine our designs accordingly. However, recognising the need for scalability and efficiency, we are actively pursuing automation in our accessibility testing procedures. By automating these tests, we aim to enhance the speed and accuracy of our evaluations while maintaining a robust commitment to accessibility. Our ongoing efforts in interface testing with assistive technology users underscore our dedication to creating a universally accessible platform, where every individual can navigate and interact with our services with ease and confidence.
API
Yes
What users can and can't do using the API
Juniper MIS seamlessly integrates with Wonde, a renowned EdTech integrator, facilitating straightforward management of school data through conventional HTTP requests. By leveraging Wonde to enable API access to our data, Juniper MIS gains plug-and-play compatibility with over 400 third-party products, enhancing its versatility and functionality. Additionally, this integration meets the Department for Education's (DfE) standards for real-time attendance data reporting, ensuring compliance with regulatory requirements while offering schools a comprehensive and efficient solution for data management and reporting.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Administrators possess the ability to customise various aspects of our service, including configuring school day details, codifying organisational policies, and extending data with custom fields. Additionally, they can personalise communication and branding, as well as build reports and dashboards. These modifications are accessible through an intuitive GUI within the product, restricted to users with appropriate privileges for system-wide adjustments. Juniper Education offers support tailored to our customers unique needs, leveraging our wealth of education experience. We provide ready-made policies and processes or assist in codifying existing ones to best serve your community.

Scaling

Independence of resources
Juniper Education deploy robust infrastructure and advanced load-balancing techniques across all our products, ensuring consistent performance backed by 24/7 monitoring. Its efficient server management and scalable architecture dynamically allocate resources, preventing any single user or group from monopolising them. Proactive monitoring detects demand fluctuations, automatically adjusting resource allocation for optimal performance.

Continuous optimisation and redundancy measures further safeguard against downtime, ensuring seamless user experiences even during peak periods.

Analytics

Service usage metrics
Yes
Metrics types
Juniper Education support adoption of your MIS across the organisation by reporting usage statistics at various levels (eg. user, department, organisation) to an administrator dashboard. These reports help customers ensure they are getting the best value for money from the product, and also target training and support where it can have the biggest impact.

If you choose to make your usage data available to our customer success teams we will also provide your organisation with regular reports and suggestions to improve the impact you can achieve with Juniper Education products.
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export their data effortlessly through built-in tools within the system. Designed to be lightweight, these tools prioritise simplicity for user convenience. Essential data frequently needed for tracking is automatically accessible, minimising the effort required to gain insights from the system's data. This user-friendly approach ensures that users can efficiently extract the information they need for analysis or migration purposes without unnecessary complexity.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • PDF
  • DfE standard including CTF/ATF
Data import formats
  • CSV
  • Other
Other data import formats
  • DfE standards including CTF/ATF
  • Excel

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
In the event of service interruption, our commitment is to swiftly minimise impact. Our dedicated team promptly address any issues and work to restore normal service, ensuring minimal disruption to operations. Throughout the resolution process, transparent communication remains paramount. We provide regular updates on our efforts and status of actions taken to address the underlying cause, keeping you informed every step of the way.

Urgent (P1) : Complete system failure. system wide inability to perform any key activities, i.e. send messages, take a register, access the system, complete payroll. Response 1hr, Resolution 8hrs

High: A key system is not functioning, causing high impact to the operating system. There is no work around or manual process. All users unable to run a key report, problem in key area is time sensitive statutory returns, payroll run. Response 4hrs, Resolution 5 days.

Normal: An issue that impacts noncritical activities but is time critical the issue can be resolved by a workaround or manual process. Unable to run a report, calculation discrepancy, unexpected behaviour of an area of the system. Response 8hrs, Resolution 4weeks.

Low: An issue that has low impact and has a suitable workaround available. It is not time critical. Response 8hrs.
Approach to resilience
The service is engineered for resilience, leveraging Amazon Cloud technology to enhance its robustness. Amazon Cloud offers a suite of features and capabilities designed to bolster resilience, including redundancy, failover mechanisms, and automated backups. These ensure continuous availability and reliability of the service, even in the face of unforeseen disruptions or failures.

Furthermore, our datacentre setup is designed with resilience in mind, implementing industry best practices to safeguard against potential threats and ensure data integrity. This includes measures such as redundant power supplies, network connections, and data replication across geographically distributed locations.

We adhere to government guidelines on cloud security principles, including the second principle of "Asset protection and resilience," which underscores the importance of safeguarding assets and ensuring resilience against disruptions. Our service aligns with these principles, prioritising asset protection and implementing resilient infrastructure to mitigate risks and maintain operational continuity.

For detailed information on our datacentre setup and resilience measures, please contact us directly. We are committed to transparency and can provide further insights upon request.
Outage reporting
Downtime incidents are promptly communicated through in-product messaging, ensuring immediate awareness. For thorough tracking and resolution, Zen Desk tickets are created and shared with the customer, facilitating accurate tracking for both Juniper support and the customer's records.

Our service has a robust system in place for reporting and managing outages to ensure minimal disruption for our customers. When an outage is expected or occurs, it is immediately reported via an email alert to both our support and infrastructure teams. This initial notification triggers a verification process confirming the nature and extent of the issue. Once verified, we communicate promptly with our customers about the outage. This communication varies depending on the situation but typically includes updates on our dedicated status page, which provides real-time information and progress reports. In addition to updates on the status page, we contact customers directly via email. This ensures all affected parties are informed and can prepare accordingly. Our approach is to maintain transparency and provide regular updates until the issue is fully resolved, ensuring our customers are well-informed and can manage their activities with minimal disruption.   

Updates to Juniper MIS are generally released outside of business hours and do not affect system availability.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Management interfaces and support channels are fortified with robust user authentication and authorisation protocols. These measures ensure that only authorised personnel can access these critical systems and channels. User authentication verifies the identity of individuals seeking access, while authorisation ensures that they have the appropriate permissions to perform specific actions within the interfaces and channels. By implementing stringent access controls, we safeguard sensitive functionalities and information, reducing the risk of unauthorised access and enhancing overall security posture.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Juniper Education, adopts a proactive approach to remediation. It begins with a thorough assessment of existing protocols and vulnerabilities, identifying gaps and areas for improvement. Swift action follows, with the establishment of tailored security measures aligned with industry best practices. Robust policies and procedures are implemented, bolstering defences and mitigating risks effectively. Continuous monitoring and audits ensure ongoing compliance and readiness to adapt to evolving threats. By prioritising security as a foundational element, Juniper Education fosters a culture of resilience, safeguarding sensitive data and maintaining trust among stakeholders.
Information security policies and processes
At Juniper, cybersecurity oversight is led by a board-level member dedicated to ensuring the security, resilience, and reliability of our products, data, and services. This executive collaborates closely with Juniper's internal IT, software engineering teams, and the Data Protection officer to enforce daily adherence to established processes. These processes include subjecting all code changes to thorough scanning for vulnerabilities before release and ensuring that security test cases are integrated into testing protocols for changes or new features.

Furthermore, all security-related changes and tests are meticulously documented within Jira, Juniper's Agile development SDLC tool. In the unfortunate event of a cybersecurity incident, Juniper's Incident Management process is promptly activated, enabling swift and effective response and resolution. This dedicated oversight ensures that cybersecurity remains a top priority across all aspects of Juniper's operations, safeguarding our systems and data against potential threats.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our configuration and change management processes are meticulously structured, employing industry-standard tools such as Jira, GIT, and Terraform to codify policies and procedures. Components of our services are tracked throughout their lifecycle, with changes assessed for potential security impact. Engineers submit "Pull Requests" in GIT, associated with change requests in Jira, which undergo peer review before acceptance into a release. Automated systems conduct static analysis to identify potential risks. Each release undergoes rigorous testing by our QA teams in segregated environments, ensuring comprehensive examination of security-related aspects before deployment.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our vulnerability management process is robust and proactive. Partnering with an external security provider, we conduct monthly network scans to assess potential threats comprehensively. These scans cover various vulnerabilities, including software flaws, configuration issues, and authentication vulnerabilities. CVE issues are promptly addressed within 30 days of discovery. Information about potential threats is obtained through these scans and other sources. We prioritise swift deployment of patches, ensuring timely mitigation of vulnerabilities. Additionally, staff undergo regular security training and phishing simulations to bolster awareness and response capabilities, fostering a culture of continual improvement in network security.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Juniper Education employs third-party services for protective monitoring of our MIS systems/infrastructure. Cloudflare provides a Web Application Firewall, analysing and blocking harmful requests before reaching our servers. Amazon GuardDuty detects malicious or unauthorised behavior internally, while Amazon CloudWatch monitors application health. We use server and application-level logs to record user actions. Our monitoring systems automatically alert us to issues or unusual activity, initiating a prompt response. Responses to potential compromises are concluded within designated timescales, ensuring swift resolution and mitigating risks to system integrity and security.
Incident management type
Supplier-defined controls
Incident management approach
Juniper Education maintains a structured incident management process, featuring named individuals, service level agreements, escalation protocols, and customer communication procedures. Upon identification, incidents are logged, categorised, and prioritised. Technical review may lead to escalation if necessary. Fixes undergo rigorous testing before deployment. In the case of security incidents, the Data Protection Officer initiates additional procedures to inform relevant parties. Throughout the response, we maintain transparent communication with affected customers, providing regular updates on progress and resolution steps, ensuring accountability and minimising disruption.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our organisation maintains a firm commitment to environmental stewardship, sustainability, and carbon reduction, underscored by our comprehensive Environment & Sustainability policy. As part of this commitment, we have implemented a range of strategic initiatives to reduce our energy consumption. Notably, the installation of Passive Infrared Sensors (PIR) to most of our offices, which has proven instrumental in energy conservation. Furthermore, we actively promote recycling practices and employ responsible waste disposal methods to mitigate our environmental footprint. In nurturing a culture of environmental responsibility within our organisation, we foster internal communications and actively engage our employees to encourage eco-friendly behaviours and practices. We have a primarily remote or hybrid workforce, and online meetings are our default, deliberately chosen to reduce the amount of travel required from our dispersed employees. We regularly review our employee location heatmap to minimise travel generally, and to ensure opportunities for employment and progression are not limited by geography. This collective effort is a reflection of our unwavering dedication to environmental preservation and sustainability.

Covid-19 recovery

Our organisation places paramount importance on both pandemic resilience and the assurance of a secure working environment for our entire workforce, meticulously adhering to local health guidelines and government mandates. Our comprehensive strategy encompasses the facilitation of remote and hybrid working arrangements wherever feasible, complemented by rigorous enhancements to our cleaning protocols. Sanitiser and masks are always available in all of our office locations. Furthermore, we actively encourage employees to avail themselves of vaccination opportunities, prioritising their health and safety. To address prospective challenges, we persistently invest in fortifying our technological infrastructure, bolstering the organisation's capacity to support remote work and collaboration. Our commitment extends to ongoing employee training initiatives, designed to prepare our workforce for any potential future adjustments. Within our organisation, our Human Resources department diligently oversees policy adjustments, affording paramount consideration to the welfare of our employees. We are dedicated to fostering a culture of transparent communication, maintaining a continuous dialogue with our employees to grasp their concerns and requirements. We carry out regular satisfaction surveys, linked to our 5 core Values, and our HRIS has a daily pulse Happy/Neutral/Sad survey which is reviewed weekly. We constantly review our provision of a secure and steadfast work environment, simultaneously ensuring the uninterrupted flow of our business operations. We feel adaptability and preparedness are essential.

Tackling economic inequality

Our organisation actively participates in apprenticeship programs. We are currently sponsoring an employee who is in the process of completing their Chartered Manager Degree Apprenticeship and have Apprenticeship opportunities planned for 2024. As part of our commitment to employee development, the organisation conducts routine training reviews to identify areas for improvement among our employees. We strongly advocate for employee training and frequently enter into training agreements with our employees to facilitate their ongoing professional growth. The provision of employee training is viewed as an investment in the advancement, cultivation, and overall prosperity of both our employees and the organisation. It yields a more proficient and engaged workforce, enhances productivity, and positions us favourably in the competitive landscape. We have introduced a ‘Juniper Minimum Wage’ for our employees, which ensures that everyone earns a Full Time Equivalent of £22,000pa – higher than the current National Living Wage rate. This company-specific rate will be reviewed annually, and our aim is always to meet and exceed the National Living Wage rate. 5 Our organisation is dedicated to promoting diversity and inclusion throughout its supply chain. We have implemented specific policies, such as Equal Opportunities & Diversity, Conduct & Standards, Bullying & Harassment, Safeguarding Policy which actively promote the participation of a wide variety of businesses. We diligently adhere to a transparent and equitable procurement process, with a clear emphasis on merit-based decisions that factor in supplier cost and availability. Our approach is rooted in objectivity and considers the qualifications and capabilities of suppliers without bias. We are aware of the importance of addressing any unconscious bias, and remain committed to ensuring that our supplier selection process is impartial, based solely on merit and the ability to meet our requirements. The Facilities team actively seek RAMs/Risk assessments and manage these processes with external contractors.

Equal opportunity

Our organisation is dedicated to promoting diversity and inclusion throughout its supply chain. We have implemented specific policies, such as Equal Opportunities & Diversity, Conduct & Standards, Bullying & Harassment, Safeguarding Policy which actively promote the participation of a wide variety of businesses. We diligently adhere to a transparent and equitable procurement process, with a clear emphasis on merit-based decisions that factor in supplier cost and availability. Our approach is rooted in objectivity and considers the qualifications and capabilities of suppliers without bias.

Wellbeing

Regular assessments are vital to our approach ensuring the well-being of our employees. We employ an independent Occupational Health service taking recommendations and advice. We actively promote 121 meetings between employees and line managers, serving as a platform for transparent and open communication. Employees and line managers discuss goals, track progress, and seek/provide support or additional training as needed. These sessions provide a safe space for employees to address work-related stress, personal challenges, and other issues. Our advocacy for 121 meetings with line managers plays a pivotal role in nurturing employee-manager relationships, supporting individual development, fostering open lines of communication, and ensuring alignment with our goals and values. We provide a free-to-use Employee Assistance Platform (EAP) where employees have access to qualified and experienced counsellors, receiving advice similar to services provided by Citizens Advice. The EAP is instrumental in addressing sickness absence and presenteeism rates, offering counselling support helping employees identify the root causes of their concerns. The well-being of every individual is our top priority. The EAP serves as one of the ways through which we offer support for mental well-being and provide a system that can make a substantial difference in our lives. This service is also open to close relatives of employees. Our HR Information System (HRIS), NaturalHR, features a daily Pulse survey accessible to all employees. This survey allows employees to express their current emotional state by clicking on an emotion that best represents their feelings. The HR department can access this data in real-time, enabling us to promptly address any concerns arising from unhappy responses. The information is also reviewed on a weekly basis. As a part of our commitment to employee well-being, we have provided free lunchtime learning sessions in the form of financial well-being webinars for our employees. These will be repeated annually.

Pricing

Price
£1,200 a licence a year
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@junipereducation.org. Tell them what format you need. It will help if you say what assistive technology you use.