R2P Systems UK Ltd

Vehicle Tracking and Scheduling

r2p vehicle tracking includes vehicle location, scheduling and optimisation tools. These are all tailor-made specifically for public and commercial road transport.

Features

  • Planning vehicle requirements
  • Planning driver duties
  • Web- and mobile-friendly platforms
  • Allocate journeys to drivers with self-regulated working times
  • Integration of fleet management and tracking systems
  • Integration of finance systems (ERP)
  • GPS tracking with driver behaviour

Benefits

  • Customise bespoke solutions
  • Prepare quotes based on time and distance estimates for journeys
  • Ensure correct information and jobs reach correct drivers
  • Multiple reporting options for drivers
  • Send quotes and generate automatic order confirmations
  • Invoice customers based on correct information

Pricing

£2.50 to £23.50 a unit a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at UKroad@r2p.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

1 3 4 7 9 5 6 8 0 9 6 0 7 9 4

Contact

R2P Systems UK Ltd Steve Holloway
Telephone: 01293 665398
Email: UKroad@r2p.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
None
System requirements
Browser based; works on any platform

User support

Email or online ticketing support
Email or online ticketing
Support response times
Usually within the hour, 9:00am - 5:00pm Monday - Friday.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Support availability: working days by call, 24/7 by email. Standard support response times: 8 business hours. Office-based account manager provides monthly performance reporting (if necessary).
Support available to third parties
Yes

Onboarding and offboarding

Getting started
R2p can create a new instance of the system and, if required, obtain data feeds and configure the system to use them. Training can be provided by webcast or onsite if required. If https or VPNs are required to secure the data connections, r2p will set these up for the user.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
Data can be exported in a range of formats using the available reporting tools.
End-of-contract process
R2p will cease to accept incoming live data feeds and allow a period of time for the buyer to export their data.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The public facing services are provided with fully responsive design.
Some management functionality is most effectively carried out using a desktop or laptop as the volume of information presented on a screen is significant.
Service interface
No
API
Yes
What users can and can't do using the API
The API allows access to the live processed data and to the historical data. Initial system setup requires desktop access. Once configured, all data can be imported or exported using the API.
API documentation
Yes
API documentation formats
  • HTML
  • ODF
  • PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
The data reporting tools allow custom reports and dashboards to be created by authorised users. Support for customised format data feeds for incoming and outgoing data is possible by r2p engineers.

Scaling

Independence of resources
Each customer instance operates within its own virtual machine and managed bandwidth.

Analytics

Service usage metrics
Yes
Metrics types
Typical metrics used: volume and quality of incoming data, volume of data requests from API, volume of requests from website and system latency.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The available reporting tools enable data export in a range of formats and different criteria.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • Bespoke - to be agreed with supplier
Data import formats
  • CSV
  • Other
Other data import formats
  • TransXChange
  • ATCO CIF
  • Bespoke - to be agreed with buyer

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection within supplier network
Use of firewalls and layer 3 switched network communications with subnetting.

Availability and resilience

Guaranteed availability
Faults shall be classified and addressed as:
Critical - any fault affecting the provision of information to more than one feed (eg. server fault, general communications fault) within 8 hours. This will be defined as not being met where either: (i) Resolution takes longer than 8 hours, or (ii) Resolution takes less than 8 hours but the System becomes unavailable again within 1 working day from the time of resolution.
Any faults affecting the provision of information to a single feed within 3 working days will be defined as not being met where either: (i) Resolution takes longer than three 3 working days, or (ii) Resolution takes less than 3 working days but the System becomes unavailable again within 1 working day from the time of resolution. Standard offered SLA is 99% availability. Refunds based on service credits against future month charges where Critical Faults not resolved in agreed times at rate of 3% per full day of service unavailable beyond SLA.
Approach to resilience
Details available on request.
Outage reporting
Visual and/or audio alerts are issued whilst calls can be automatically raised within the Fault Management System (FMS) and e-mail and or text notifications sent to pre-defined personnel. This is augmented by technical support monitoring. The system includes a dashboard presenting the status of all operating assets.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Permissions are managed through groups. Groups control which menus and data are available to the user.
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials
Information security policies and processes
The Managing Director has overall responsibility for information security and governance. The Delivery Manager has day-to-day oversight and is responsible for delivery of the information organisational policies. Awareness and update briefings are held, including regular testing of compliance and reviews of system configuration.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
R2p configuration and change management forms part of the ISO9001 certification. All elements of software and infrastructure are under configuration management. Software is fully version-controlled with ability for roll back. The r2p Fault Management System (FMS) is used to track all changes to implemented systems and manage processes. Customer access to the FMS allows for full visibility of a system's history. Before sign-off, all changes are reviewed for governance, security, operational and functionality.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
R2p undertake constant review of trade press and news statements for any threats to core IT systems, eg. membership of transport trade groups for domain specific awareness. Security forms part of regular customer reviews to enable customer-specific threats to be identified. Security updates to operating system and related components including off the shelf software are configured to automatically install. The information governance process includes risk assessment of security threats.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Regular reviews of system usage include user logins. The system automatically reports above defined levels of increased system use.
Any potential or actual compromise becomes a critical incident with immediate response with customer and Director involvement. Critical incident management is available 24/7. If feasible, the first response is to make the system inaccessible, leaving it running for any forensic analysis that may be needed.
Incident management type
Supplier-defined controls
Incident management approach
The FMS provides a controlled framework for the identification, recording, progressing, closing and analysis of faults enabling rapid reporting of standard incident types. Faults can be reported by telephone (via a dedicated Customer Support line which will be answered by
Customer Support personnel and not an automated voice system), email or web interface. The FMS allows the Service Manager or authorised personnel to view status of all tickets (open or closed) with the ability to drill down to details. Changes to ticket status will be notified by automated email.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£2.50 to £23.50 a unit a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at UKroad@r2p.com. Tell them what format you need. It will help if you say what assistive technology you use.