Snap Out is a virtual personal assistant that assists you with travel to upcoming meetings and events


  • Automatic travel time in your calendar
  • Automatic event invitee emails
  • Proactive travel option recommendations
  • Calendar conflict detection
  • Destination country information emails
  • Automatic calendar event invitee reminder emails
  • Add default time padding to your calendar events
  • Reports on how your time is spent
  • Send virtual call instructions to calendar event invitees automatically
  • Daily itinerary reports


  • Ensure enough time is scheduled for travel in your calendar
  • Send instructions to invitees automatically to help them prepare
  • Receive schedule travel options without a time consuming manual search
  • Prevent overlapping appointments in your calendar
  • Receive up-to-date country information including travel advice
  • No need to chase invitees to respond to calendar invitations
  • Allow time/contingency in your schedule to prepare for meetings
  • Understand how much time you spend in meetings and travelling
  • Save time and send instructions to invitees automatically
  • Receive daily schedule email including travel plans


£10 per person per month

  • Free trial available

Service documents

G-Cloud 10


Snap Out

Chloe Sharp


Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Digital calendar software
Cloud deployment model Private cloud
Service constraints -
System requirements Web browser

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 24 hour response time, Monday-Friday
User can manage status and priority of support tickets No
Phone support No
Web chat support No
Onsite support No
Support levels Online ticket-based support. Please submit your requests to
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Online documentation and live chat is provided to help users start using our service.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction A user can extract their data at any time from their account settings page on the website.
End-of-contract process The user's account is closed and removed at the end of the contract. There are no additional costs.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Mobile user interface is optimised for mobile device screens
Accessibility standards WCAG 2.0 A
Accessibility testing The user interface has been tested using a screen reader simulation toolkit.
Customisation available Yes
Description of customisation Any user can customise the service directly online when they have logged in to their account.

The following items can be customised:
1. Calendar integration
2. Preferred transport options
3. Meeting message content
4. Home/work/other locations
5. Work hours
6. Notifications


Independence of resources Our Service Level Agreement covers availability of the service. We use a scalable cloud-based infrastructure to host the service. The service is monitored and the infrastructure is amended based on demand and availability.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach A user can export their data from the account settings page on the website.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99.8% minimum uptime per calendar month.
Service credits are generated for any calendar month to compensate directly for any downtime that exceeds 0.2% per calendar month.
Approach to resilience Available on request.
Outage reporting An email alert is sent when a planned or unexpected outage occurs.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Our internal interfaces and support channels are available to authorised staff only. Our management team approves all new access requests.

Access to these channels and interfaces is granted subject to contractual obligations and only as required.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Security activities are linked with our goals and priorities.

We have named individuals that are responsible for security.

All security considerations and activities are considered to maximise confidentiality, integrity and availability. Business cases document the need for such activities and require sign-off by authorised staff.

Data is classified at different levels and process according to its level through the authorisation process.
Information security policies and processes Every employee, contractor or associate is required to comply with contractual obligations which include how information is managed and processed, so that information is kept safe and used appropriately.

All authorised staff are required to read our information handling policies.

Our service is governed by a privacy policy that defines how data is processed and used.

Our CTO is responsible for all matters in regard to information security and reports directly to the board and management team.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Configuration is fully self-service.

Our change management process is initiated by a request to our support help desk. All requests are considered and are reviewed in regard to the product functionality.

All changes are prioritised and take security risk into consideration of setting priority.

Our service used automated testing to test the performance of components, which includes confidentiality, availability and integrity.

Security testing is conducted for every major release of the service.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Automated testing and periodic security testing, including testing on every major release, are conducted to identify any potential threats to our service.

We use a vulnerability scanner service to check for potential network threats on a continuous basis.

All new threats are recorded and reviewed on a continuous cycle. Any threat that is classified as high priority is actioned immediately and is applied as a "hot fix" to the service. Lower priorities are included in upcoming releases as planned.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We use a third-party services (including a vulnerability scanner and web performance service) to monitor our service for compromises. We do not publicly disclose information about our protective monitoring process.

Any valid identified compromised are responded to immediately.
Incident management type Supplier-defined controls
Incident management approach Incidents are managed using our support help desk which is available through email or our website.

A user can report an incident using the help desk and this will be assigned to a member of our support team. The incident ticket will be updated by the support team and it will be closed when resolved.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £10 per person per month
Discount for educational organisations No
Free trial available Yes
Description of free trial Free limited version of the service is available. This includes access to try out the main components of the service for a limited number of events.


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑