Gov360 OpenSky : Waste Data Management System (WDMS)
WDMS is a cloud-based system allowing for the collection, transformation and reporting on the movement of waste. Tracking waste from collection to disposal with results of tracking used by contractors, sites, collection and disposal authorities to view, report, plan and assist in decision making for all the parties involved.
Features
- Realtime Data Tracking
- Automatic Data Upload
- Quality Data Validation
- Database Consolidation
- Invoices & Claims
- Stock Management
- Dashboard & Waste Analytics
- Automatic and Self-Service reporting
Benefits
- Central, secure, accessible repository for historic and predictive data
- Save time collecting, validating, processing and reporting waste data
- 80% out-of-the-box functionality uniquely designed to meet all WDA’s requirement
- Customisation in mobile applications, analytics and data-management meets 100% requirements
- Customised to reflect your business processes - nothing is wasted
- Saves significant numbers of days in administration per month
- Integrates with financial and ICT infrastructure, generating validated, quality information
- Standardises and validates all incoming data (contractors, transfer stations, WCA’s)
- Report on actual tickets rather than estimates
- Simplifies WDF through automating the file processing and production
Pricing
£600 to £1,250 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 7 9 3 5 7 4 3 3 3 5 1 8 8 5
Contact
Open Sky Data Systems
William Flanagan
Telephone: +44 203 051 2392
Email: wflanagan@openskydata.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Internet connectivity required if hosted remotely or requiring remote access
- System requirements
- System requirements are dependent on each individual project.
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- OpenSky provide excellent, flexible support services for our solutions, from standalone applications to complex systems. Our standard package provides remote support services by dedicated support experts from 08:00 to 18:00 Monday to Friday, with 24/7 access to the service desk portal. We provide aggressive SLAs with response times from 30 minutes for Severity 1 tickets, to 4 working hours for Severity 4 tickets, and guaranteed resolution times from 4 working hours for Severity 1 tickets to 40 working hours for Severity 4 tickets. Non-standard packages (onsite, out of hours or on-call support services) can be tailored to your needs.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- N/A
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
- OpenSky provide excellent, flexible customer and technical support services for our solutions, from standalone applications to complex systems. Our ITIL aligned Service Desk combines expert technical personnel with expert customer service to bring the highest standard support solutions. Our standard package provides: - Level 2 and Level 3 Remote Support Services - Dedicated support service desk and cloud support experts from 08:00 to 18:00 Monday to Friday - 24/7 access to the service desk portal - Self-service Knowledge Base and FAQs facility on web portal - System Monitoring - Suite of Daily System Checks performed by start of business each day - Aggressive and guaranteed Response and Resolution times - Support Lead dedicated to your account - Face to face or video-conference meetings - Monthly Service Reports including performance against SLAs and KPIs - Facility for change requests, enhancements - Onsite Quarterly Service Review meetings Non-standard packages can be tailored to your needs, including: - Level 1 Remote Support Services - Onsite Level 1, Level 2 and Level 3 personnel - Out of hours or on-call support services
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
OpenSky provides comprehensive training and support to help users effectively start using our services. Our approach focuses on ensuring users understand the benefits of the new system and driving adoption for a successful rollout.
Training options include:
• Classroom: Hands-on, onsite training for small groups
• Webinars: Ideal for ongoing and refresher training sessions
• Self-service: Training guides, quick start tutorials, and other materials available via the support portal
• eLearning: Delivered through partners like Microsoft
We cater to different user groups:
• Core Group: Often involved in the project team, they become super-users and internal trainers
• System Administrators: Receive tailored training on system configuration and user management
• Wider Group: Role-based training delivered through dedicated onsite sessions or webinars
Our training covers both the "how" and "why" of the new system, reinforcing the benefits of working in a new way. We also provide ongoing support through our helpdesk services to ensure users can effectively utilise the service.
By offering a range of training channels and targeting different user groups, OpenSky ensures a smooth transition and successful adoption of the new system. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
When a contract for an OpenSky service ends, we ensure that users can easily extract and transition their data. We understand that all data remains the intellectual property of our clients, and we are committed to a smooth handover process.
If clients choose not to extend their contract with OpenSky, we will work closely with the incoming provider to map and transfer the data to their new platform. This ensures a seamless transition and minimizes any disruption to the client's operations.
For clients using Microsoft platforms, the process is even simpler. As part of our handover project, the incoming provider will assume control of the existing data within the Microsoft environment. This eliminates the need for complex data extraction and migration processes.
Throughout the end-of-contract phase, OpenSky's team will work diligently to support the transition, providing necessary documentation, technical assistance, and knowledge transfer to the incoming provider. Our goal is to ensure that clients retain full control over their data and can continue their operations without interruption. - End-of-contract process
-
At the end of an OpenSky service contract, we work closely with clients to ensure a smooth transition and align with their overall strategy. Whether the project is being handed back to the client or to an incoming provider, we facilitate the necessary knowledge transfer through a comprehensive Hand Over to Service (HOTS) package. The HOTS package includes:
• Staff debriefs
• Status reports on outstanding issues, risks, and incomplete tasks
• Completion of all task and QA documentation
• Formal feedback on project performance and impact
• Lessons learned report
• Map of outstanding tasks for completion by the incoming/client team
• Financial close of the task
• Statement of completion
The price of the contract typically includes the agreed-upon scope of work, which is determined during the initial project scoping stage. Any changes or additional tasks outside the original scope will be mapped out and priced separately as additional days.
OpenSky's standardised approach ensures that each project is properly closed down and handed over to the client and/or support team. We aim to provide a seamless transition and ensure that clients are well-equipped to continue their operations or work with their new provider.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- OpenSky's solutions are designed to be mobile responsive, ensuring equal accessibility across both mobile and desktop browsers. The user interface adapts seamlessly to different screen sizes and resolutions, providing a consistent and intuitive experience for users on smartphones, tablets, and desktop devices. This mobile-friendly approach enables users to access, monitor, and manage automated processes on the go, without any loss of functionality or performance compared to the desktop version. OpenSky prioritizes mobile responsiveness to cater to the increasing demand for flexibility and remote access in today's fast-paced business environment.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- As an interface to OpenSky Support Services, we provide a dedicated Service Desk Web Portal that is available to customer on a 24/7 basis via standard web browser. Tickets can be logged to the service desk either by direct email to a dedicated support email address or via the web portal interface. Customers can view, track, manage and update tickets via this portal as well as accessing self service Knowledge Base and FAQ facilities.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
-
OpenSky's service interface is fully accessible, complying with WCAG 2.1 AA and EN 301 standards. The Jira Service Desk portal, available 24/7 via web browser, ensures equal access for all users, including those with disabilities. Key accessibility features include:
• Keyboard navigation and screen reader compatibility
• High contrast mode and adjustable text sizing
• Clear, concise, and descriptive labelling of elements
• Logical tab order and focus management
• Accessible error messages and feedback
OpenSky is committed to providing an inclusive and user-friendly experience, enabling all customers to effectively view, track, and manage tickets through the portal. - API
- Yes
- What users can and can't do using the API
-
OpenSky's services offer flexible API’s that allow users to integrate the service with their existing systems and workflows. The specific API capabilities and limitations may vary depending on the individual solution and customer requirements. However, in general:
• Users can configure and set up the service through the API, including defining workflows, data sources, and automation rules.
• API documentation will be provided to guide users through the setup process.
• Users can make changes to the service configuration, such as modifying workflows, updating data sources, and adjusting automation parameters through the API.
• API endpoints will be available for managing and updating various aspects of the service.
• Some advanced features or complex customizations may require assistance from OpenSky's support team and may not be fully accessible through the API.
• API usage limits and rate restrictions may apply to ensure fair usage and maintain service performance.
Full API documentation will be provided to customers, detailing the available endpoints, request/response formats, and any specific limitations or considerations for their unique solution. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Our bespoke Waste Data Management System is designed to allow system administrators and users the flexibility of customising and configuring the system to meet their specific needs. Any changes in the organisation can be easily accommodated making this application scalable and extensible. The main requirements for customisation are: The right/privileges to make changes (based on security role and permissions), understanding of the business process, familiarity with the application architecture, a structured methodology for implementation. Some of the major types of customisations include: customising forms, views and charts, automations using workflows and dialogs, customising reports and dashboards and managing templates for document and email generation.
Scaling
- Independence of resources
- At OpenSky, we ensure that users are not affected by the demand placed by others through advanced capacity planning and resource allocation. Our platform is built on a scalable architecture that dynamically adjusts to fluctuations in demand. By leveraging Microsoft cloud technologies and load balancing, we can efficiently distribute workloads across multiple servers, preventing any single user from monopolizing resources. Additionally, our proactive monitoring systems continuously analyse usage patterns, allowing us to optimize performance and maintain a consistent level of service for all users, regardless of the overall demand on the system.
Analytics
- Service usage metrics
- Yes
- Metrics types
- OpenSky provides comprehensive service metrics to measure the success of our solutions. These metrics include ROI analysis, tracking key performance indicators (KPIs) such as efficiency, error reduction, and cost savings. We monitor compliance, rework hours, and digital competency within your teams. Additionally, we assess the size and quality of the automation pipeline, audit passes/fails, and delivery time. By consistently monitoring these metrics, we ensure continuous optimisation of your initiatives, enabling you to achieve your desired business outcomes and maximise the value of your investment in our services.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
From within the system all data screens can have the contents exported at the push of a button.
Full data base exports are available through the service desk. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLS / XLSX
- DOC
- HTML
- CSV
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- XLS / XLSX
- TXT
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- We guarantee a high level of availability for our services. Our SLAs ensure that our platform and services are available and performing optimally 99.9% of the time. We achieve this through a robust, scalable architecture built on cloud technologies, which allows for efficient distribution of workloads and prevents any single point of failure. Our proactive monitoring systems continuously analyse performance, enabling us to identify and resolve potential issues before they impact availability. Furthermore, our SLAs include clear definitions of availability, maintenance windows, and exceptions. We also provide transparent reporting on our availability metrics, so users can easily verify that we are meeting our commitments. By combining high availability with strong SLAs and a commitment to transparency, we ensure that our users can rely on our services to support their critical business processes.
- Approach to resilience
-
We host on a Tier 1 data centre, competing and on a par with Azure and AWS (among others). Our hosting partner, fully hosted in the UK, guarantees that data centre HVAC and power will be functioning 100% of the time in a given month, excluding Maintenance. Power includes UPSs, PDUs and cabling.
Power: Our power systems deliver conditioned power while protecting against sags, surges, swells, spikes and electrical noise. Uninterruptible power supplies (UPS) provide instant failover for continuity during a power outage. And our on-site, always-fuelled diesel generators are prepared to pick up the load quickly during extended outages.
Cooling: Our N+2 redundant chiller configuration uses a combination of centrifugal chillers, cooling towers, chilled water loop pumps and condenser water loop pumps — with redundant water sources.
Network: Our robust network includes nine backbone providers, allowing us to shift traffic as needed. This configuration, co-developed with Cisco, guards against single points of failure at the shared network level.
HVAC: Our precision Heating, Ventilation and Air Conditioning (HVAC) environment includes HEPA-equipped air handling units that remove dust and contaminants. In the event of an HVAC system failure, we have redundant HVAC systems for immediate failover. - Outage reporting
- At OpenSky, we prioritize timely and transparent outage reporting to keep our customers informed about any service disruptions. OpenSky monitors service health through a combination of the Admin Dashboard and Email Alerts. These last can be configured to notify administrators of outages.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- VPN access. 2-factor authentication. Username and Password
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- CDL Group
- ISO/IEC 27001 accreditation date
- 10/12/2023
- What the ISO/IEC 27001 doesn’t cover
- There is nothing out of scope for ISO 27001:2013. OpenSky Data Systems have been independently assessed and accredited to ISO 27001:2013 Information Security Management Systems, Standards and guidelines.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
At OpenSky, information security is a top priority. As a Microsoft Solutions Partner with certifications in ISO 20000:2018, ISO 9001-2005, ISO 27001-2013, and Cyber Essentials, we adhere to stringent security policies and processes.
Our comprehensive information security management system (ISMS) is based on industry best practices and standards. It includes well-defined policies covering data protection, access control, incident management, business continuity, and more. These policies are regularly reviewed and updated to ensure they remain effective in the face of evolving threats.
We follow a structured reporting hierarchy for information security matters. Our dedicated security team is responsible for overseeing the implementation and enforcement of security policies. The Security Team reports directly to the senior leadership, ensuring that security receives the highest level of attention.
To ensure compliance with our policies, we employ a combination of technical controls, regular security audits, and employee training. Access to sensitive information is strictly controlled and monitored. All employees undergo mandatory security awareness training, and we maintain a culture of shared responsibility for protecting information.
Our rigorous change management processes include security impact assessments for any changes to our systems or processes, ensuring that security remains a key consideration throughout.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We leverage the PROSCI-ADKAR® Model to guide our approach, managing change at both individual and organizational levels. All components of our services are meticulously tracked throughout their lifetime using comprehensive configuration item records.
Changes undergo a rigorous control procedure involving thorough analysis, security plan reviews, and extensive testing in non-production environments.
Our dedicated Change Control Board carefully assesses changes and their potential security implications before granting approval. Post-implementation, we update our security testing processes to validate the changes and maintain the overall security posture. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Our application infrastructure is hosted by Rackspace. Service includes: • The 24x7x365 Operations Center, staffed by experienced GCIA-/GCIH-certified security analysts. • Using threat intelligence and advanced analytics to detect and remediate threats on your behalf, 24x7x365, based on pre-approved actions. • Leveraging leading security technology to deliver security services. Comprehensive traffic monitoring, multilayered anomaly detection technologies and immediate DDoS mitigation. Combines two powerful alerting technologies — network-level packet scanning and server-level anomaly detection — to identify attacks, then mitigates effects by precisely eliminating DDoS traffic. Anomalous behaviours trigger an alert with a 30-minute response guarantee for proactive protection subscribers.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our hosting provider, Rackspace, uses the best practices described in the ISO 27002 security standard. This standard is recognized globally as the most comprehensive framework for establishing and maintaining information security best practices within an organization. As these controls are essential to our security posture, we refrain from describing them in detail on publicly available documents. Application level vulnerabilities are dealt with on a case by case basis, and are prioritised based on the threat level (i.e. high, medium and low) and implementation plans are circulated to the customer to advise as to timelines for same.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Internally we use ITIL framework for Incident management. Microsoft provides robust processes incidents. • Identification – System and security alerts may be harvested, correlated, and analyzed. • Containment – The escalation team evaluates the scope and impact of an incident. • Eradication – The escalation team eradicates any damage caused by the security breach, identifies root cause for why the security issue occurred. • Recovery – During recovery, software or configuration updates are applied to the system and services are returned to a full working capacity. • Lessons Learned – Each security incident is analyzed to protect against future re-occurrence.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
OpenSky’s Waste Data Management System (WDMS) not only improves waste management practices but also addresses wider social and environmental goals, demonstrating our commitment to adding value beyond the contractual scope.
WDMS supports environmental protection by enhancing the efficiency of waste management operations. By providing accurate, real-time data, it enables better planning and resource allocation, significantly reducing unnecessary waste and emissions. The analytics feature helps in identifying trends and areas for improvement in recycling and waste reduction, aligning with climate change mitigation efforts.Covid-19 recovery
Throughout the Covid-19 pandemic, our WDMS system has ensured uninterrupted waste management services by facilitating remote monitoring and management of waste processes. This capability has been essential in maintaining hygiene and public health standards during the pandemic, aiding in community recovery and resilience.Tackling economic inequality
By optimising resource distribution and reducing operational costs, our WDMS system helps lower the cost of waste management for local authorities. This saving can be redirected towards community welfare programs, contributing indirectly to economic equality by improving public services available to underprivileged areas.Equal opportunity
OpenSky's WDMS system promotes equal opportunities by ensuring that all communities, regardless of economic status, have access to top-tier waste management solutions. This helps bridge the service quality gap across different regions, fostering a more balanced distribution of environmental health benefits.Wellbeing
By improving the overall efficiency and effectiveness of waste management, our system contributes to cleaner, safer, and healthier community environments. Reducing waste accumulation and promoting recycling initiatives enhances public spaces, which directly benefits community wellbeing.
Pricing
- Price
- £600 to £1,250 a unit a day
- Discount for educational organisations
- No
- Free trial available
- No