Our eLearning content catalogue is written in line with the current UK legislation, targeted at Health and Social sectors.
All courses are designed by professional and highly experienced content developers specialising in user engagement and interaction.
All courses are accessible on any device, in a modular and deep scrolling format.
- Learning Management, delivery and reporting
- eLearning Management, delivery and reporting
- Deployment, design and consultancy services
- Training, support and coaching services
- Transition from existing LMS to Moodle
- Growing list of titles to meet Health /Social Care standards
- Editable content that you can tailor to local use
- Multi Language Support
- SCORM compliant
- Responsive bespoke theme
- Bespoke content design to meet legislation
- Complement classroom training or stand alone
- Compliance training delivery
- Easy access and great staff user experience
- Reduce costs with interactive and easy to manage online learning
- Realise the full potential of rolling out self service.
- Content designed for public sector and healthcare organisations
£2250 to £20000 per instance per year
Chambury Learning Solutions [Chambury Consulting Ltd]
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||Courses are developed using the Adapt authoring Tool delivering access on any device, in a modular and deep scrolling format. All courses are SCORM format and will require an LMS to deliver to your users.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Tickets are prioritised on status;
Urgent respond with 2 hours
High respond within 4 hours
Medium respond within 24 hours
Low respond within 72 hours
Urgent is where the system is confirmed as unavailable for everyone.
High is where the application failure causes all users to be unable to perform some portion of their job.
Medium is where the application failure causes a small number of users are unable to perform all or some portion of their job.
Low is where there is a request for service /general user queries /customisations etc.
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.0 AA or EN 301 549|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Onsite support|
Our SLA is;
Urgent; Response within 1 hour resolve within 4 hours
High; Response within 2 hours resolve within 8 hours
Medium; Response within 8 hours resolve within 4 days
Low; Response within 8 hours resolve within 15 days
Unlimited access to online /telephone helpdesk operates Monday to Friday, 8.30am to 5.30pm
All customers have a dedicated learning consultant, access to customer conferences and workshops /focus groups at no additional cost.
|Support available to third parties||No|
Onboarding and offboarding
Upon agreement the content can be delivered within a few days to the customer. We bundle all content with Adapt the open source authoring tool which allows you to edit and customise the content to local requirements, or it can be used as 'off the shelf' eLearning.
A bespoke theme is agreed with you so the content can go-live with local branding.
Full training is available on the use of Adapt which you can take advantage of.
|End-of-contract data extraction||Our services are open source meaning that you can transfer to another supplier simply and easily. If you end your contract we will deactivate your Adapt account and provide any user and completion data to you in CSV format. You can of course run local reports to download data as required.|
|End-of-contract process||Upon termination of the contract a process will be agreed to provide access to data from within the system. The customer can extract any data they require through front end reports and we will supply a full copy of the database. The system code including code for any customisations /plugins will not be provided; any efforts to restore the system by the customer will be by use of a local Adapt installation. If required there will be a single cost of £1,500 (ex VAT) to provide a full copy of the DB. Upon expiry of the agreement any specific reports that the customer requests from the supplier and does not run locally will be charged at the standard day rate.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
Our eLearning content is designed to be fully responsive – meaning the user interface will adjust seamlessly depending on what device you are using; desktops, laptops, tablets or smartphones.
All features available on the desktop site are available on the mobile site. The site responds to the screen size and distributes content appropriately to be displayed on desktop, smartphone and tablet devices.
|Accessibility standards||WCAG 2.0 A|
Our platforms are open source and this provides subscribers the freedom to make changes to the system to meet business needs and apply radically different themes. Additional themes or changes can be made to follow published accessibility guidelines in order to meet local requirements.
This freedom also allows for changes to be made to specific workflows and screens to provide an enhanced experience for users of assistive technologies (eg if your organisation uses specific screen reader technology for learners who need it as they each have their own inconsistencies).
The system meets WCAG standards.
|Description of customisation||
All content can be tailored to meet the customer organisation requirements including content, branding and design.
Where a customisation is required we work with the customer(s) to define the process, wireframes to meet specification. This can be with a single customer, or within our customer user groups where collaboration is required /desired.
Content is developed by our in-house developers and launched on staging for local testing, and on production once agreement is confirmed.
|Independence of resources||
All services include uptime performance monitoring, server updates, and SSL/TLS security. This can be scaled up if required to accommodate large usage or content needs (costs may increase if more capacity is required).
Our developers have access to dashboards that inform of CPU, RAM and SDD use and any limitations on the service. High level risks are automatically sent to developers by email and SMS for necessary action(s).
All sites are optimised for local usage and monitored for improvement ongoing to ensure all sites operate at optimal efficiency.
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||
Report results can be exported to a file or automatically emailed as a file attachment in the following formats.
Export in Excel format
Export in text format (CSV)
|Data export formats||
|Other data export formats||
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
We work to make your System available for use over the internet 24 hours per day, 7 days per week. We provide a hardware infrastructure that we calculate, using reasonable estimations and based usage figures that you have provided us, will allow us to provide the service that you need. If the usage patterns of your users increases or changes in profile dramatically, we will inform you of this and suggest a revised hardware infrastructure.
99.5% uptime guarantee.
Backups are kept on and off server so a system can be restored timely.
Planned maintenance is excluded from the calculation. At least 5 working days of notice will be provided for any maintenance taking place between 5pm and 8am. At least 10 working days of notice will be provided, for any maintenance taking place between 8am and 5pm.
If a dispute arises out of or in connection with the contract or performance, validity or enforceability of it (Dispute) then the parties shall follow an agreed procedure.
NB; Changes or enhancements to the infrastructure are subject to agreement and may not be covered by our original contract and fees.
|Approach to resilience||This information can be made available on request.|
Hosting and Maintenance includes uptime performance monitoring, server updates, security that can be scaled up if required to accommodate large usage or content needs (costs may increase if more capacity is required).
Our developers are alerted to potential risks via server dashboards that show CPU, RAM and SDD capacity /usage /spikes. Email alerts to our developers are also in use to alert them of issues before they arise.
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||
Authentication methods (also known as authentication plugins) include:
Manual accounts: Username and password
No login: Suspends user account.
Email-based self-registration: Enables users to create their own accounts.
// The following methods rely on authentication with an external server /DB.
CAS server (SSO):
Moodle Network authentication:
PAM (Pluggable Authentication Modules): Account details come from the operating system Moodle is running on, via PAM (can only be used Linux/Unix).
|Access restrictions in management interfaces and support channels||
Access to management interfaces are through system defined and user defined URPs. Full access to define permissions can be granted as appropriate.
Support channel access is determined in agreement with the customer. A user can view their own tickets, or all tickets for their organisation.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||Cyber Essentials|
|Information security policies and processes||
We have policies in place for;
- Business continuity;
- Confidentiality and Data Sharing;
- Information Governance and security;
- Hosted services SLA;
We have standard operating procedures for all employees for core processes to ensure that information security is adhered to, All staff are required to agree to and sign the above mentioned policies, and are monitored via quarterly reviews.
The reporting structure is as below;
- Learning System Consultants report to the Managing Director;
- Senior Developer reports to the Managing Director;
- Helpdesk Support Technicians report to the Senior Developer;
- Junior Developers report to the Senior Developer;
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
If either party requests a change to the scope or execution of the Services including patch updates /upgrades, the Supplier shall provide a written estimate of the likely time required to implement the change including any necessary variations to the Supplier’s charges, the likely effect of the change and any other impact of the change on this Agreement.
Once agreed the changes, any addition costs, the Services, Project Plan and any other terms of this Agreement will be updated. All changes are tested in a staging environment for local testing prior to installation to the production environment.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
We have intrusion detector service for each server that monitors all servers and ports combining port scanning with regular vulnerability assessments of the configuration and software to highlight potential areas of exploit.
We monitor changes to configuration and binaries, maintaining a change audit trail.
Alerts are sent to an email address whenever a significant event occurs on the server allowing us to react where necessary. We then take any necessary actions to fix the vulnerability (even if the alert is a false positive). This include DDOS attacks or brutal force attacks and monitors all changes in the system.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
We combine port scanning with regular protective assessments of the server configuration and software in order to highlight potential areas of exploit. We actively monitor all connections to our servers controlling access only to approved users /machines on dedicated IP addresses.
Where a penetration attack takes place automated emails alert technical staff to the attack so actions can be taken. Following any vulnerability we check if any data was compromised /taken. Access credentials for all users /servers are changed following any vulnerability regardless of status.
Any attacks are managed as the alert is raised with actions immediately taken.
|Incident management type||Supplier-defined controls|
|Incident management approach||
User can report incidents within our online Helpdesk by raising a ticket. A complaint /Incident would be allocated to the appropriate team member(s) for investigation. Incidents are dealt with by senior team members.
• Reply acknowledges incident within 5 days
• Record incident in our central register (SharePoint) within 1 day.
• Acknowledge customer reply within 3 days.
• Investigate commences.
• Team member contributions within 5 days
• Examination of replies within 4 days
• Meeting to discuss outcome within 5 days
• Letter to confirm outcome within 2 days
We retain the right to amend process and timescales.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£2250 to £20000 per instance per year|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||Access to a dedicated demo zone in order to trial and pilot Moodle with a group of users.This may be to try out various features. Trial services are time limited and in a shared environment.|
|Link to free trial||A dedicated URL will be provided following initial meeting|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|