Emma.ai is a virtual personal assistant that assists you with travel to upcoming meetings and events
- Automatic travel time in your calendar
- Automatic event invitee emails
- Proactive travel option recommendations
- Calendar conflict detection
- Destination country information emails
- Automatic calendar event invitee reminder emails
- Add default time padding to your calendar events
- Reports on how your time is spent
- Send virtual call instructions to calendar event invitees automatically
- Daily itinerary reports
- Ensure enough time is scheduled for travel in your calendar
- Send instructions to invitees automatically to help them prepare
- Receive schedule travel options without a time consuming manual search
- Prevent overlapping appointments in your calendar
- Receive up-to-date country information including travel advice
- No need to chase invitees to respond to calendar invitations
- Allow time/contingency in your schedule to prepare for meetings
- Understand how much time you spend in meetings and travelling
- Save time and send instructions to invitees automatically
- Receive daily schedule email including travel plans
£10 per person per month
- Free trial available
|Software add-on or extension||Yes|
|What software services is the service an extension to||Digital calendar software|
|Cloud deployment model||Private cloud|
|System requirements||Web browser|
|Email or online ticketing support||Email or online ticketing|
|Support response times||24 hour response time, Monday-Friday|
|User can manage status and priority of support tickets||No|
|Web chat support||No|
|Support levels||Online ticket-based support. Please submit your requests to firstname.lastname@example.org.|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||Online documentation and live chat is provided to help users start using our service.|
|End-of-contract data extraction||A user can extract their data at any time from their account settings page on the website.|
|End-of-contract process||The user's account is closed and removed at the end of the contract. There are no additional costs.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Mobile user interface is optimised for mobile device screens|
|Accessibility standards||WCAG 2.0 A|
|Accessibility testing||The user interface has been tested using a screen reader simulation toolkit.|
|Description of customisation||
Any user can customise the service directly online when they have logged in to their account.
The following items can be customised:
1. Calendar integration
2. Preferred transport options
3. Meeting message content
4. Home/work/other locations
5. Work hours
|Independence of resources||Our Service Level Agreement covers availability of the service. We use a scalable cloud-based infrastructure to host the service. The service is monitored and the infrastructure is amended based on demand and availability.|
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||No|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||A user can export their data from the account settings page on the website.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
99.8% minimum uptime per calendar month.
Service credits are generated for any calendar month to compensate directly for any downtime that exceeds 0.2% per calendar month.
|Approach to resilience||Available on request.|
|Outage reporting||An email alert is sent when a planned or unexpected outage occurs.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||
Our internal interfaces and support channels are available to authorised staff only. Our management team approves all new access requests.
Access to these channels and interfaces is granted subject to contractual obligations and only as required.
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
Security activities are linked with our goals and priorities.
We have named individuals that are responsible for security.
All security considerations and activities are considered to maximise confidentiality, integrity and availability. Business cases document the need for such activities and require sign-off by authorised staff.
Data is classified at different levels and process according to its level through the authorisation process.
|Information security policies and processes||
Every employee, contractor or associate is required to comply with contractual obligations which include how information is managed and processed, so that information is kept safe and used appropriately.
All authorised staff are required to read our information handling policies.
Our CTO is responsible for all matters in regard to information security and reports directly to the board and management team.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Configuration is fully self-service.
Our change management process is initiated by a request to our support help desk. All requests are considered and are reviewed in regard to the product functionality.
All changes are prioritised and take security risk into consideration of setting priority.
Our service used automated testing to test the performance of components, which includes confidentiality, availability and integrity.
Security testing is conducted for every major release of the service.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Automated testing and periodic security testing, including testing on every major release, are conducted to identify any potential threats to our service.
We use a vulnerability scanner service to check for potential network threats on a continuous basis.
All new threats are recorded and reviewed on a continuous cycle. Any threat that is classified as high priority is actioned immediately and is applied as a "hot fix" to the service. Lower priorities are included in upcoming releases as planned.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
We use a third-party services (including a vulnerability scanner and web performance service) to monitor our service for compromises. We do not publicly disclose information about our protective monitoring process.
Any valid identified compromised are responded to immediately.
|Incident management type||Supplier-defined controls|
|Incident management approach||
Incidents are managed using our support help desk which is available through email or our website.
A user can report an incident using the help desk and this will be assigned to a member of our support team. The incident ticket will be updated by the support team and it will be closed when resolved.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£10 per person per month|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||Free limited version of the service is available. This includes access to try out the main components of the service for a limited number of events.|
|Pricing document||View uploaded document|
|Terms and conditions document||View uploaded document|