Swirrl IT Limited

PublishMyData

PublishMyData is an end-to-end solution for publishing and connecting data on the web, helping public sector organisations work more efficiently and to deliver improved services. PublishMyData incorporates a polished end-user website, powerful management interface, performance-tuned graph store and programming interfaces - delivered together with hosting maintenance, technical support and consultancy.

Features

  • Publish linked open data
  • Machine readable and human readable '5-star' data
  • Searchable data catalogue
  • Make complex custom data selections for download
  • API and SPARQL endpoint access to data
  • Data downloads
  • 'Grafter' Extract-Transform-Load framework for data import
  • Data visualisations
  • Support for 'data cube' statistical data
  • Sophisticated data administration user interface and API

Benefits

  • Publish open data on the web to maximise data re-use
  • Reduce costs and increase quality of the data publishing process
  • Make data easily accessible to analysts
  • Enable developers to build applications using your data
  • Present data clearly to non-specialists
  • Support data-driven decision making and policy design
  • Meet government guidance for 5-star data

Pricing

£1500 per instance per month

Service documents

G-Cloud 9

124796459607935

Swirrl IT Limited

Bill Roberts

0845 0035 389

gcloud@swirrl.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints No specific constraints.
System requirements
  • Modern web browser (IE11+, Chrome, Firefox, Safari)
  • Web access from customer site, both http and https

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 2 hours during support period: 08:30-17:30, Monday to Friday (excluding UK public holidays)
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels See Service Definition document for full details.

All options include: availability and support response SLA, bug fixing, security updates, backups, new software versions at no extra cost.

Resource bundles come with varying amounts of premium support time, for miscellaneous help and advice, answering end user questions, data updates, progress reviews, data strategy advice, data modelling and processing, training etc
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started The services comes with documentation, including guidance on getting started.

On-site training courses, can be commissioned as part of a premium support service.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction All published data hosted by the system is available for download in a range of formats. In addition, Swirrl can provide on request a single full dump of a customer's data.
End-of-contract process At the end of the contract, the customer's site is turned off.

All customer data will be deleted 30 days after end of contract, unless the customer requests us to retain a copy of it (which we are happy to do at no extra charge).

The customer can download data themselves or Swirrl will provide a full export of the customer's databases at no extra charge.

Any custom requirements for data export can be supplied at extra cost as part of the premium support service.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service All functions are available on mobile devices, with the exception of some interactive map-based visualisations that are impractical on small touch-screen based devices, and some technical details of API access are only available on larger screens.
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing The site has been designed to work effectively for users with visual impairments, who may depend on screen readers, and users who are unable to use standard pointing devices and may depend on keyboard or alternative interface approaches.
API Yes
What users can and can't do using the API All published data in the system is available via API. Each page in the user interface has options to retrieve data in various machine-readable formats, as well as the HTML view; and there is an openly available fully flexible query endpoint (using the SPARQL query language) for a fully flexible approach.

In addition, authorised administrators can update the data in the site through an API, which supports all the same functions as the adminstration user interface (with the exception of user management) - including adding, deleting and updating dataset contents, dataset metadata and supporting vocabularies and reference data.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The basic level of customisation is to adapt the colour scheme, customer logo, choice of fonts and introductory home page text.

Further customisations typically consist of additional external applications focused on delivering subsets of data for particular audiences or purposes. These can be developed by buyers themselves, using the APIs provided, or can be commissioned from Swirrl as part of premium support services.

Scaling

Scaling
Independence of resources Each customer has their own assigned virtual server with associated computing resources.

Analytics

Analytics
Service usage metrics Yes
Metrics types Total data storage
Web site use (powered by Google Analytics)
Total network traffic (powered by the provider of cloud virtual servers)
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Less than once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can export data using the download features built in to the user interface of PublishMyData, or can use the API or query endpoint for more complex or specific export requirements.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON-LD
  • Turtle
  • N-triples
  • Plain text
Data import formats
  • CSV
  • Other
Other data import formats
  • JSON-LD
  • Turtle
  • N-triples

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability See Service Definition document for details of SLA, which provides for 99.5% availability and a scale of increasing refunds if the SLA is not met.
Approach to resilience We use major public cloud datacentres (Google Cloud and Amazon Web Services) who provide world-leading standards of resilience.
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Access to the management interface of a service is restricted by username and password. Each registered user is assigned a role, with associated rights, so the degree of access of each user can be assigned appropriately.

A customer can nominate which users are able to use the support service and named individuals are granted access.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach We follow practices based on ISO27001 but have not been formally accredited.
Information security policies and processes We follow internally documented security policies, available on request. A company director has responsibility for ensuring processes are followed. New staff are trained in the procedures.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All software components are tracked in a version control system. An automated continuous integration system is used to test and manage controlled builds of the overall system. New builds are only deployed after passing all tests, which include security related tests. Third party libraries used are reviewed for any known security vulnerabilities and for alignment with the overall security architecture.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerabilities in third party software, such as operating systems, databases, web servers, web development frameworks, are monitored via the subscriptions to relevant mailing lists.

Most reports of security vulnerabilities require installation of a software patch or new version.

Based on potential impacts, the urgency of installing the fix is assessed. Sometimes, immediate action will be required. Sometimes, upgrading can be part of the next software release.

Because of the use of cloud servers and the automated approach to deployment, updates to the OS are implemented by setting up a new virtual server, then applying all relevant OS patches and upgrades.
Protective monitoring type Supplier-defined controls
Protective monitoring approach All errors arising in the system are reported to a tracking service, which sends email alerts to support staff. A range of potential unusual server behaviour is also monitored and leads to email alerts when certain conditions are met. Any such alert is investigated to understand the cause.

The response to a compromise depends on the severity, but in serious cases it would involve taking a server offline, then rebuilding a clean new server and loading backup data. Serious incidents are addressed immediately we become aware of them.
Incident management type Supplier-defined controls
Incident management approach Users can report incidents by email, phone or web form to our support system (currently using the Freshdesk software), where a ticket is issued.

Reports on incident resolution, or progress towards resolution are added to the ticket in Freshdesk, which the user can view at any time.

The system provides reports on numbers and types of incidents and resolution time.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1500 per instance per month
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑