GroupEd
GroupEd offers a cloud-based school management information system (MIS) designed for simplicity and efficiency. Streamline your administrative tasks, enhance communication, and access insights for improved decision-making.
Features
- Student data management and tracking
- Attendance monitoring and reporting
- Parent and student communication tools
- Behavior and safeguarding management
- Assessment and gradebook functionality
- Curriculum planning and timetabling
- Financial management and reporting
- Analytics and insights
- Mobile app for parents and students
- Integrations with other education tools
Benefits
- Saves time and reduces workload
- Improves data accuracy and accessibility
- Enhances communication and collaboration
- Provides insights for decision-making
- Cloud-based for anywhere, anytime access
- Integrated modules reduce need for multiple systems
- Streamlines administrative processes
- User-friendly interface for ease of use
- Supports regulatory compliance
- Customizable to school/MAT needs
Pricing
£650.00 to £20,000 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 9 2 3 8 6 1 1 7 4 6 6 1 3 2
Contact
GROUP ED LIMITED
Cerys Furlong
Telephone: 07825986177
Email: cerys@grouped.org.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
SIMS 7 (Capita)
Arbor
Bromcom
ScholarPack
Pupil Asset
iSAMS
Engage
RM Integris
Facility CMIS
SchoolPod
WCBS
And more (the list is regularly being expanded) - Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
-
- Web browsers- Microsoft Edge, Firefox, Chrome, Safari
- Windows 7 and above
- MacOS
- Android OS
- IOS
- Recommended 4GB Ram
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Our Knowledge Support is available 24/7/365
Our Webform/ email support and customer service phone line are available Monday- Friday 8am- 5pm
We categorise all support requests depending on number of users affected and disruption to customer, as detailed in our Service Delivery Document but summarised as:
High Priority- Response in 2 hrs
Medium Priority- Response in 12 hours
Low Priority- Response in 24 hours - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We provide a comprehensive support package that combines technical assistance with proactive guidance:
Included with our service:
Access to our extensive knowledge base, FAQs, and tutorials.
Support ticketing system with guaranteed response times within 24 hours during business days.
Direct email and phone support with experienced engineers.
Proactive system monitoring and alerts to identify potential issues before they cause disruptions.
Regular consultations to optimise your use of our platform and address emerging needs. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We provide a comprehensive onboarding experience to ensure users can quickly and successfully adopt our service. This includes:
User Documentation: A well-structured knowledge base with step-by-step guides, tutorials, and FAQs for self-paced learning.
Online Training: Webinars, live demos, and pre-recorded video courses to offer more interactive guidance.
Onsite Training (if applicable): Tailored training sessions at the client's location for larger implementations or complex setups.
Dedicated Support: Our support team is readily available to answer questions, provide assistance, and address any initial challenges.
Proactive Outreach: We may utilise personalised onboarding plans with check-ins for larger clients to ensure a smooth transition.
Our goal is to empower users to achieve their objectives with our service from day one. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Word Doc
- Video
- Powerpoint
- End-of-contract data extraction
-
We ensure you retain full ownership of your data and provide flexible options for extraction at the end of the contract.
Preferred Method: Secure JSON API provides structured data for easy integration with other systems. We'll assist with API access and documentation.
Alternative Formats: If needed, we can export data in common formats like CSV upon request.
Data Retention: We'll clearly outline in the contract any data retention periods after the contract ends to ensure ample time for extraction.
Support: Our support team is available to guide you through the extraction process and answer any questions. - End-of-contract process
-
Data Access and Export: We ensure you retain full ownership of your data after the contract ends. We provide options for easy export:
Secure download of your data in a common format (CSV, JSON).
Access to our API for programmatic data extraction (for developers).
Contract Renewal: We'll notify you well in advance of your contract expiration to discuss renewal options and ensure a smooth service continuation.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- We provide a full API access to all data assuming the school and relevant parties have provided permission to do so.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
We understand that every user has unique needs. Our service offers flexibility through the following customization options:
What Can Be Customised
Features Page: Our easy-to-use features page allows schools to enable or disable specific functionalities as needed. This might include things like:
Parent communication
Attendance
Activities
School Shop
and so on
Self-Service: Designated school administrators can directly manage feature settings through the features page within the user interface.
Who Can Customise
Administrators: School administrators with the appropriate permissions have access to customization options to ensure they have control over their school's setup.
Additional Notes:
We may offer expanded customization capabilities for larger organizations or bespoke requirements – please contact our sales team to discuss individual needs.
Scaling
- Independence of resources
-
Data Replication: We replicate data in at least three geographically distinct areas for redundancy and high availability. This ensures data safety and helps balance read traffic.
Load Balancing: We utilise load balancers to distribute traffic intelligently across our infrastructure, ensuring that no single server or resource becomes overwhelmed.
Resource Allocation and Scaling: We implement dynamic resource allocation and autoscaling mechanisms that adjust capacity based on demand, ensuring that each user has the resources they need.
Performance Monitoring: Proactive monitoring helps us identify bottlenecks early, allowing for timely adjustments to maintain optimal performance.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Feature usage:
Supports training needs assessment.
Informs feature adoption and usability improvements (Product Managers).
Parent/Guardian usage:
Provides adoption metrics to schools, aiding identification of engaged parents and targeted follow-ups.
Staff usage:
Offers login history and permission data for security monitoring.
Tracks individual service usage for each staff member. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- This can be done via a button to export to excel where available or via an API.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- Excel
- JSON
- WONDE
- CTF
- ATF
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- WONDE migration tool
- CTF
- ATF
- XML
- GroupEd API
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
We target a 99.999% uptime. We currently don't guarantee this, nor offer a refund if it is not met.
We unsure that our failover mechanisms are in place to be able to deliver 99.999%. - Approach to resilience
-
Data is automatically replicated across at least three locations. This safeguards data even if an entire location fails.
Point in time recovery is supported. - Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Management access has password and MFA and where data is more secure, we will restrict access to only certain IP addresses.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Barclays Bank
- PCI DSS accreditation date
- 01/02/2018
- What the PCI DSS doesn’t cover
-
PCI DSS Compliance Level 4
Applies to: Any merchant processing fewer than 20,000 e-commerce transactions per year, and all other merchants — regardless of acceptance channel — processing up to 1 million Visa transactions per year. For example, a small local business.
Unlike higher levels of PCI compliance, PCI DSS Level 4 merchants do not require audits, do not submit ROC, and may not need AOC forms.
Organizations at this level are mainly faced with meeting the PCI requirements of their bank. Their requirements typically include:
Using only Qualified Integrators and Resellers (QIRs) to install, integrate, and service point-of-sale (POS) equipment and applications
Perform an annual Self Assessment Questionnaire (SAQ)
Perform quarterly network scans with an ASV - Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
We have a robust security governance framework that aligns with industry best practices . This includes:
Risk-Based Approach: We regularly assess risks to our software and customer data. This informs our security policies, controls, and priorities.
Secure Development Lifecycle (SDLC): Security is integrated throughout our development process, from design to deployment. We use code reviews, security testing, and vulnerability scanning.
Access Controls: We implement the principle of least privilege with role-based access controls and regular permission reviews
Incident Response: We have a defined incident response plan for rapid detection, containment, and remediation of potential security breaches. - Information security policies and processes
-
We prioritise information security practices in our daily work. Key policies and processes we follow include:
Acceptable Use Policy (AUP): We strictly adhere to the company's AUP, ensuring responsible use of technology and data.
Password Security: We implement robust password practices, including strong, unique passwords, secure storage via a password manager, and regular updates.
Data Classification and Handling: We classify data based on sensitivity and apply encryption, access controls, and secure transfer methods accordingly.
Access Controls: We operate on the principle of least privilege, accessing only necessary systems and data for our roles.
Incident Reporting: We have a clear understanding of the incident reporting process, ensuring prompt communication of any suspected security breaches.
Security Awareness: We actively participate in security training and stay informed about evolving threats to maintain a strong security posture.
We recognise information security as a continuous process and remain committed to protecting the company's assets.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- While we have relatively infrequent infrastructure changes, we maintain a software-centric approach to configuration management. We track software versions, dependencies, and deployment configurations for both our API and front-end applications. Changes to these components undergo a thorough risk assessment, specifically evaluating security impacts. This includes potential vulnerabilities, threats to data integrity, and implications for compliance with security standards. We leverage AWS tools as needed to gain visibility into our infrastructure and aid in the change assessment process.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We identify potential threats through AWS security bulletins, trusted sources, and by monitoring AWS WAF and Shield events. We assess and prioritise vulnerabilities based on risk. Patches are deployed swiftly, often using automation, with testing prior to production rollout. Scans verify effectiveness. Automated emails notify stakeholders about critical vulnerabilities, and regular status reporting is provided.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Our protective monitoring processes center on real-time analysis of system logs, network traffic, and security events. We use a combination of automated tools and manual review to identify potential compromises, suspicious activity, or policy violations. Upon detecting a potential compromise, our incident response protocol activates. This includes immediate containment to limit impact, followed by investigation, root cause analysis, and remediation. Our target response time for critical incidents is within one hour to ensure swift mitigation.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management process follows a structured framework with pre-defined procedures for common incident types, ensuring consistency and efficiency. Users report incidents via a designated helpdesk, phone line, or online portal. Incident reports are logged, triaged, and escalated based on severity. Throughout the process, we provide regular updates to impacted stakeholders and generate a detailed post-incident report. This report includes root cause analysis and recommendations to prevent future occurrences.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
We are ambitious about reducing our impact on the climate and committed to reducing our carbon emissions to as close to zero as possible. We do this through working with AWS, who have committed to reaching net zero by 2040, a decade ahead of the Paris commitment. We do not rely on legacy servers which are energy inefficient. We also regularly review our working practices to minimise our impact on the environment, for example our sustainable transport and active travel policies.Covid-19 recovery
A key impact of Covid 19 on schools and young people has been a reduction in attendance levels across the UK and all age groups. We have designed innovative ways to support schools to improve attendance-ensuring that more young people attend school and can address impact of covid 19Tackling economic inequality
We are committed to delivering innovative and disruptive technologies throughout the ongoing development of GroupEd so that we can deliver lower cost and higher quality goods and services to schools.
Our use of cloud based software, and modern database infrastructure ensures our business is scalableEqual opportunity
Centralised, Accessible Data: GroupEd's MIS consolidates information about students, including demographics, protected characteristics, academic progress, and other relevant data. This allows schools to have a clear overview of their whole school community, improved data analysis so that they can address the inequalities that occur for different pupils across schools, local authorities and multi academy trusts.
Monitoring and Analysis: The reporting and analytics features in GroupEd help schools track and analyze data related to protected characteristics (e.g., gender, ethnicity, special educational needs). This enables identification of potential disparities or areas where greater focus on equal opportunity is needed.
Fair Processes: GroupEd's tools for admissions, attendance, behavior management, and assessments create a structured system. This helps promote consistency and reduces the potential for bias in decision-making.
Communication: GroupEd's communication features facilitate engagement with parents and students from diverse backgrounds. This promotes inclusivity and helps ensure everyone has an equal voice.
Company Ethos: GroupEd itself is committed to equal opportunity within its own workforce. This commitment should ideally be reflected in their dedication to providing tools that aid schools in doing the same.Wellbeing
The MIS brings together student information such as attendance, behavior, academic performance, and safeguarding concerns. This provides a holistic view of each student, empowering staff to identify potential wellbeing issues early.
Effective behavior management is crucial for student wellbeing. GroupEd's tools help track behavior patterns, both positive and negative, allowing for targeted interventions and support.
Communication tools facilitate open dialogue between schools, parents, and students. This fosters a sense of community and allows for concerns to be raised and addressed quickly.
By automating administrative tasks and streamlining processes, GroupEd helps to reduce teacher workload, a significant factor influencing wellbeing in schools.
GroupEd's analytics can reveal trends in attendance, behavior, and academic data that might signal potential wellbeing concerns. This allows schools to take proactive measures.
Pricing
- Price
- £650.00 to £20,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Everything is included for 60 days.